Sunday, July 14, 2013

Twas the day before the adventure home.

photo

What an incredible picture. If you like this picture, then you?ll love the information that comes with it. This picture was taken as three people began a relationship with Jesus. So AMAZING!!!!

This week has been an incredible week, God has been doing some spectacular things. One of which happened on Tuesday as the crew Drip and Runs worked on the site. They were following the promoting to ?IDENTIFY? a need in the community when they came across a family of 12, the youngest member being only 13 days old. The family recently moved from Minnesota to help out other family members here in Mississippi.

During the daily devotions on the first day the Drip and Runs decided to throw a baby shower for the 13 day old baby. This baby without the help of this crew would never have had a baby shower due to limited resources. On Wednesday the Drip and Runs delivered two cases of newborn sized diapers, three boxes of size two diapers, one box of size three diapers, 800 wipes, onesies, shirts, and toys for the older siblings. The best part of this whole story was that on Thursday, while walking the neighborhood, the mother sought the crew out requesting prayer! Proof that investing into peoples lives truly works. 16 homes in all were worked on.

This week has had an eternal impact, I would like to thank all who made this possible. Please continue to pray for this community and all who helped out.

You can stay up to date on details related to World Changers/P2 missions on Facebook. As well as what God is doing in and through the lives of World Changers/P2 missions! ? ? ?https://www.facebook.com/wcmissions

?

Here are all the crews!

Source: http://blog.lifeway.com/worldchangers/twas-the-day-before-the-adventure-home/

the fray national anthem dallas tornado oikos kentucky wildcats oakland school shooting nike nfl jerseys katie couric

Saturday, July 13, 2013

BF Series Virus Protection Computer Science Essay - UK Essays

Computer virus ... All the computer users are aware of this topic in present. What is a computer virus? How can they harm to a computer? Those are really interesting questions to figure out. So this survey focuses interesting topics about computer viruses. Specially about best solutions that can get to prevent from virus attacks.

\newline\newline

In this survey most of the details gain from web based references and several tricks are included as recovering from virus attacks. Using this survey, readers can have clear idea about computer viruses and their behaviors. Moreover readers can get good idea about prevention and recovery stages of virus attacks.

\newpage

\begin{center}

\LARGE

\underline {{\bf Acknowledgment}}

\end{center}

\Large

I would like to express the deepest appreciation to my supervisor , Mr. K.P.M.K. Silva, lecturer of University of Colombo School of Computing, whose encouragement, guidance and support from the initial to the final level enabled me to make this success.

\newline\newline

In addition, I would like to thank Dr. H.L. Premaratne , lecturer of University of Colombo School of Computing , who encourage to do this literature survey successfully.

\newpage

\tableofcontents

\newpage

\section {Chapter 1 - Introduction}

\Large

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer or even delete everything on the hard disk .

\newline\newline

To mask an action on infection of other programs and harm drawing can be carried out not always. After the virus has executed the actions necessary to it, it transfers control to the program it lives in, and it works the same way as usually. That is why the work of the infected program looks the same as the work of not infected.

Many versions of viruses are arranged so that at the beginning of the infected program the virus remains not noticed, i.e. before operating system reboot, in memory of the computer and from time to time infects programs and carries out harmful actions on the computer.

\newline \newline

All actions of a virus can be carried out quickly enough and without delivery of any messages, therefore it is very difficult for user to notice that there is something unusual in the computer.While few programs are infected on the computer, virus presence can be almost imperceptible.

\newline \newline

In this survery, first few chapters explain types of viruses and how virus is working. Then symptoms of virus infections are listed out in next chapter. After that latest viruses and precautions describe in next two chapters. Finally recovering stage is explained in details.

\newline \newline

\newpage

\section {Chapter 2 - Types of Viruses}

Computer viruses can categorized into following types based on their behavior. It is better to have a look at virus types before move to protection phase.

\newline \newline

{\bf Trojan Horse: }

A trojan horse program has the appearance of having a useful and desired function. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

{\bf Worms: }

A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

{\bf Boot sector Virus: }

A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot up.

{\bf Macro Virus:}

Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

{\bf Memory Resident Viruses:}

Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.

{\bf Rootkit Virus: }

A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.

{\bf Polymorphic Viruses:}

A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.

{\bf Logic Bombs/Time Bombs:}

These are viruses which are programmed to initiate at a specific date or when a specific event occurs. As an example, virus which deletes a database table if a certain employee gets fired.

{\bf Boot Sector Infectors:} Also sometimes called boot record infectors, system viruses, or boot viruses, these programs attack the vulnerable boot program that is stored on every bootable floppy disk or hard disk. This code is executed by the system when the PC is started up, making it a juicy target for virus writers: by installing themselves here they guarantee that their code will be executed whenever the system is started up, giving them full control over the system to do what they wish.

{\bf File Infectors:} These viruses directly attack and modify program files, which are usually .EXE or .COM files. When the program is run, the virus executes and does whatever it wants to do. Usually it loads itself into memory and waits for a trigger to find and infect other program files.

\newpage

\section {Chapter 3-How Viruses Work}

\subsection {Life cycle of a virus}

The life cycle of a virus begins when it is created and ends when it is completely eradicated. The following outline describes each stage:

{\bf Creation}

Until recently, creating a virus required knowledge of a computer programming language. Today anyone with basic programming knowledge can create a virus. Typically, individuals who wish to cause widespread, random damage to computers create viruses. Replication Viruses typically replicate for a long period of time before they activate, allowing plenty of time to spread.

{\bf Activation}

Viruses with damage routines will activate when certain conditions are met, for example, on a certain date or when the infected user performs a particular action. Viruses without damage routines do not activate, instead causing damage by stealing storage space.

{\bf Discovery}

This phase does not always follow activation, but typically does. When a virus is detected and isolated, it is sent to the ICSA in Washington, D.C., to be documented and distributed to antivirus software developers. Discovery normally takes place at least one year before the virus might have become a threat to the computing community.

\clearpage

{\bf Assimilation}

At this point, antivirus software developers modify their software so that it can detect the new virus. This can take anywhere from one day to six months, depending on the developer and the virus type.

{\bf Eradication}

If enough users install up-to-date virus protection software, any virus can be wiped out. So far no viruses have disappeared completely, but some have long ceased to be a major threat.

\subsection {The general way that viruses work}

\begin{itemize}

\item An infected program is run. This is either a program file (in the case of a file-infecting virus) or a boot sector program at boot time. In the case of a Microsoft Word document the virus can be activated as soon as the document that contains it is opened for reading within Microsoft Word. If the "NORMAL.DOT" document template is infected (and this is the most common target of these viruses) then the virus may be activated as soon as Microsoft Word is started up.

\item The infected program has been modified so that instead of the proper code running, the virus code runs instead. This is usually done by the virus modifying the first few instructions to "jump" to where the virus code is stored. The virus code begins to execute.

\item The virus code becomes active and takes control of the PC. There are two ways that a virus will behave when it is run: direct-action viruses will immediately execute, often seeking other programs to infect and exhibiting whatever other possibly malicious behavior their author coded into them. Many file-infector viruses are direct-action. In contrast, memory-resident viruses do not do anything immediately; they load themselves into memory and wait for a triggering event that will cause them to "act". Many file infectors and all boot infectors do this.

\item What exactly the virus does depends on what the virus is written to do. Their primary goals however include replication and spreading, so viruses will generally search for new targets that they can infect. For example, a boot sector virus will attempt to install itself on hard disks or floppy disks that it finds in the system. File infectors may stay in memory and look for programs being run that they can target for infection.

\end{itemize}

\newpage

\section {Chapter 4-Symptoms of Viruses}

Following are few common symptoms of virus infection

\begin{itemize}

\item The computer runs slower than usual.

\item The computer stops responding, or it locks up frequently.

\item The computer crashes, and then it restarts every few minutes.

\item The computer restarts on its own. Additionally, the computer does not run as usual.

\item Applications on the computer do not work correctly.

\item Disks or disk drives are inaccessible.

\item Can see unusual error messages.

\item There is a double extension on an attachment that recently opened file, such as a .jpg, .vbs, .gif, or .exe. extension.

\item An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.

\item An antivirus program cannot be installed on the computer, or the antivirus program will not run.

\item New icons appear on the desktop, or the icons are not associated with any recently installed programs.

\item Strange sounds or music plays from the speakers unexpectedly.

\item A program disappears from the computer

\newline \newline

These signs may also be caused by hardware or software problems that have nothing to do with a computer virus.

Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware.

\end{itemize}

\newpage

\section {Chapter 5- Latest Viruses}

\subsection {Latest viruses in 2010 }

\begin{itemize}

\item {\bf Backdoor.Bot}

Backdoor.Bot is a hacker agent, it allows the computer to be remotely controlled by another user.

\item {\bf W32.Netsky.T@mm}

Netsky.T worm arrives as an e-mail attachment. The infected attachment name, message body and subject is randomly chosen by the worm.

\item {\bf W32.Stration@mm}

Stration aka Warezov is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. Stration worm arrives as an e-mail attachment. It has the ability to download new variants of malware from Internet.

\item {\bf W32.Blackmal.E@mm}

W32.Blackmal.E@mm aka VB.BI is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. It attempts spread through network shares.

\item {\bf W32.Sober.X@mm}

Sober.X is a mass mailing worm uses e-mail addresses collected from the system to distribute infected mails. The worm uses its own SMTP engine to spread. The infected mail will be in English or German.

\item {\bf W32.Beagle.AV@mm}

Beagle.AV is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. Beagle worm arrives as an e-mail attachment.

\item {\bf W32.Sasser.Worm}

Sasser is a network Worm, exploits a remote code execution vulnerability LSASS to infect target systems. It scans for IP addresses and infects unpatched systems.

\item {\bf W32.Mydoom.A@mm}

Novarg aka Mydoom is a mass mailing worm, uses e-mail addresses collected from .wab, .adb, .tbb, .dbx, .asp, .php, .sht, .htm, .txt files to distribute infected messages. Novarg worm arrives as an e-mail attachment. The infected attachment name, subject and message body is randomly chosen by the worm. The worm also spreads using KaZaA P2P network.

\end{itemize}

\par

\subsection { Most dangerous computer viruses}

\textbf{7. Jerusalem - 1987}

For the first time it was discovered in 1987 on October 1. The virus was dubbed Jerusalem because it was identified in a Hebrew university, but in 1991 antivirus experts found that Italy is the country were the first traces of the computer virus were noticed. Jerusalem is believed to be one of the oldest computer viruses in history, being able to infect both .EXE and .COM files. Initially the Jerusalem virus included a bug that led to a repeat infection of the files that continued until the size of the files overcome computer resources. In addition, each Friday 13 it deleted all programs in the infected system as a result of a malicious payload that set off on the respective day. Jerusalem considerably slowed down the machine. A person could identify the virus but noticing two lines on the monitor.

\textbf{6. Morris (a.k.a. Internet Worm) - 1988}

The name of the virus comes from its developer Robert Tappan Morris. The computer worm was set off on November 2, 1988 and after some time it managed to infect 6,000 to 9,000 machines. It overloaded the whole Internet, leading to the failure of a large number of servers. According to its developer, the goal was to discover just how far and fast a computer worm can spread all over the network.

\textbf{5. Barrotes - 1993}

This is believed to be the first popular computer virus developed in Spain. As soon as it infected the system, it would remain there until January the 5th, when it would set off showing a series of bars on the screen. It infected .COM, .EXE and overlay files. The Barrotes computer virus represents a resident virus - it becomes a resident of the computer memory each time the machine starts up. It could also overwrite the Master Boot Record of the HDD, thus making it impossible for the uses to access the hard disk.

\textbf{4. Solar Sunrise - 1998}

This is not the name of the computer virus, it is the name of the situation that occurred in 1998 when a team of hackers managed to take control of more than 500 computer system of the army, government as well as private sector of the United States. The name Solar Sunrise comes after the well-known vulnerabilities in machines that run on the Sun Solaris OS. At first the attack was believed to have been organized by hackers from Iraq, but later it was discovered that the ones to blame were two American youngsters from California.

\textbf{3. CIH (a.k.a. Chernobyl) - 1998}

This computer virus managed to affect huge amounts of data stored on computers. Later it was discovered that the computer virus was launched in Taiwan. It has been recognized to be one of the most dangerous computer viruses in history. It infected Windows 95, 98, and ME executable files. In addition, CIH remained resident in the memory of the machine, being able to carry on infecting other executables. After being activated, the virus overwrote data on the HDD of the infected PC, making the latter inoperable. CIH could also overwrite the BIOS of the infected computer, thus preventing boot-up.

\textbf{2. Melissa - 1999}

This computer virus managed to cause a damaged estimated between $300 and $600 million. The famous computer virus gained huge fame on March 26, 1999. Experts claimed that this computer virus managed to infect between 15 and 20 percent of all business PCs on the planet. Melissa virus spread so fast that a number of big companies, including Intel and Microsoft, that used Outlook, had to shut down their email systems to hold up the damage. The computer virus took advantage of Microsoft outlook to send email messages of itself to 50 names on the contact list of a user. The message in the email read: "Here is that document you asked for don?t show anyone else." It featured an attached Word document, which, when opened, unleashed the virus that infected the computer and then repeated the replication.

\textbf{1. ILOVEYOU - 2000}

Considered to be one of the most dangerous computer worms in history, ILOVEYOU was for the first time detected in Philippines on May 4. In just one day it spread worldwide, with about 10 percent of all Internet users being affected by the worm. ILOVEYOU also caused \$5.5 billion damage. Its name comes from the subject of the email that a user received. The email included an attachment that said "LOVE-LETTER-FOR-YOU.TXT.vbs". When activated, the computer worm overwrote all files on the host, attacking a copy of itself to each file. In addition, the worm sent a copy of itself to everyone in a user's contact list.

\newpage

\section {Chapter 6-Precautions}

Following are the steps to prevent from a virus invasion,

\begin{itemize}

\item Load only software from original disks or CD's. Pirated or copied software is always a risk for a virus.

\item Execute only programs of which users are familiar as to their origin. Programs sent by email should always be suspicious.

\item Computer uploads and "system configuration" changes should always be performed by the person who is responsible for the computer. Password protection should be employed.

\item Check all shareware and free programs downloaded from on-line services with a virus checking program.

\item Purchase a virus program that suitable for computer performance and up-date it frequently.

\item More Connections Means More Risk: A standalone PC with a stable software base has much less chance of becoming infected by a virus than a PC shared by multiple users that is connected to a large network.

\item Use Backups: If users have the ability and the discipline to maintain multiple backups of system over a period of time, this is a useful "last ditch" defense against virus infection. It does not really prevent viruses from striking the system, but it can save the users from unlucky situations such as data loss.

\item Control Access to PC: Owner should be careful about who uses the system. Generally speaking, a PC in an open area used by dozens of people will develop viruses far more often than one on an individual's desk. The reasons are obvious. To prevent the casual use of a PC in an office environment, consider using a boot password

\item Scanning: Scanning floppies before they use first time. It is a good way of protecting system from the spread of viruses from other systems.

\end{itemize}

\newpage

\section {Chapter 7 - Recovering from a Virus Attack}

If anyone unfortunate enough to be the victim of a virus attack, then options narrow. User have to find the infected files on their computer, and then either disinfect them (by removing the virus code) or delete them?hopefully before the virus has done any permanent damage to the system.

However, no need to give up and throw the computer away. Almost all viruses can be recovered from?some quite easily. All that need is a little information, and the right tools.

Quite often, running an antivirus program is need to do to recover from a virus infection. However, if a virus has deleted or corrupted any document or program files on PC, user will probably have to restore those files from backup copies?or reinstall any damaged programs from their original CD-ROMs. In a worst-case scenario, where the operating system files have been affected, then may need to reinstall entire operating system?or even, in some instances, reformat hard disk and rebuild entire system from scratch.

\newline \newline

These are some common problems that occured to users:

\newline

\textbf{Can firewalls detect virus?}

Firewalls do not screen computer viruses. As the location of firewalls is a good place for scanning, some firewalls has plug-in virus scanning module. And some programs scan virus at a point either before or after a firewall. Note that scanning FTP or HTTP traffic adds heavy network overhead but blocks only one of the sources of virus.

\newpage

\textbf{Why some viruses can be detected but not cleaned with the anti-virus software?}

Anti-virus software not only detect viruses, but also other types of malicious codes, which may not be cleanable. For example, trojan horse is a type of malicious code that should be deleted instead of cleaned. In other cases, the virus may have corrupted the file and made it impossible to clean / recover.

\textbf{Can email message be infected?}

Plain electronic mail messages with pure text and contain no executable code will not be infected. However, files attached to the message may be infected. If someone receive an e-mail with attached files from an unknown source, the best approach is to scan it before running the file or opening it in Word or Excel. If it open the file attachments directly, there is a risk infecting computer. The latest generation of antivirus software can usually be configured to scan e-mail attachments before open them

{\bf What we expect from Anti virus tool?}

{\bf Effectiveness}

Antivirus is specifically designed to protect the computer, so if it does not do that well, what good is it? All the features, bells and whistles, or sleek interface can?t make up for poor performance. We look at results from the industry-standard security software testers and professional security organizations to find the most effective software available and evaluate overall effectiveness. In general, our highest ranked programs are also the most effective.

{\bf Ease of Installation and Setup}

Security software shouldn?t be a chore to install, and should have protected as soon as possible. From download to install, to the first scan; implementing antivirus software should be quick and easy.

{\bf Ease of Use}

Antivirus software is complex stuff, but should not require a degree in computer security. The best security programs have all the features security experts want, but are just as easily used by a beginner. Everyday computer users want a security solution that they can install and forget about; software that does not require constant maintenance or have annoying interruptions. The best antivirus software is flexible enough to do exactly what user want to (even if that means running by itself).

{\bf Features}

A well-rounded feature set takes a security solution from good to great. More than bells and whistles, added features provide security, usability and performance benefits.

{\bf Updates}

Security software is only as good as its latest update. Viruses are being identified and added to signature databases all the time, so it?s important that virus definition list updates accordingly. Modern antivirus software are equipped with automatic updates that perform regularly enough that get faster updates that don?t slow down the system. The best security providers even ?push? updates as soon as they are available.

\newpage

\section {Chapter 8- What types of virus scanners exist?}

\subsection { Methodes of virus scanning}

Today's antivirus software typically adopt one or more of the following methods to screen emails and files moving in of a computer:

{\bf File Scanning -} usually after antivirus installation and download of latest virus definitions. This scans certain or all files on the computer to detect virus infection. All antivirus allows user scheduled background scanning.

{\bf Email and Attachment Scanning - }since email is the primary virus delivery mechanism, this is the most important function of the antivirus software. All antivirus today scans both email content and attachments for viruses - some like Norton picks up emails from users' email server before passing it to computer for scanning .

{\bf Download Scanning -} scans files that are being downloaded from a website/FTP. Ex. during a "File Download" - Save this file to disk operation or using a download accelerator.

{\bf Heuristic Scanning - }used to detect viruslike code in emails and files based on intelligent guessing of typical viruslike code patterns and behaviour. Test labs use 'zoo viruses -fabricated viruses' to test performance of antivirus software in detecting new viruses.

{\bf Active Code Scanning - }new browsers allows active codes like Java and ActiveX in webpages. But these codes can also be of malicious nature and do severe damage to the computer and go on to infect other computers. Links in emails can invoke active codes in a webpage and do the same damage.

\subsection {Anti Virus Tools}

Following shows comparison of some best anti virus tools:

\newline

{\bf BitDefender Antivirus Review}

BitDefender Antivirus protects the computer from number of online threats, including viruses, spyware, phishing scams, and more. The software basically covers users from every angle, protecting from threats on the internet, email, and even instant messaging. BitDefender scans all web, IM, and email traffic for malware. The software is even equipped to encrypt IM conversations

BitDefender?s scanners run in real-time, but don?t require a lot of resources. In fact, the new optimized scans run 30\% faster than last year (which were already fast), without significantly increasing system load and even reducing the boot time.

\newline

Another advanced feature is one sure to please PC gamers. Bitdefender features a no-interruptions gamer mode that is ideal for stopping annoying notices or popups from interfering while users are in the middle of some intense gaming

BitDefender 2010 is also equipped to run effectively on laptops, and features a special laptop mode designed to optimize battery life.

This year BitDefender adds user profiles, allowing the end user to choose the level of control they want from the program, and choosing from three distinct interface choices specifically designed to accommodate their specific needs and activities.

\newline

{\bf Kaspersky Anti-Virus Review}

Kaspersky Anti-Virus is a complete antivirus solution with real-time protection from a number of threats, including viruses, Trojans, bots, worms, and even spyware. The software is more than equipped for comprehensive security.

Kaspersky Anti-Virus 2010 offers full web protection; the Kaspersky URL Advisor gives a whole new level of protection online. The plug-in works with a browser (Firefox and/or IE) and provides integrated warnings and advanced protection while user surf.

Kaspersky has historically been one of the most effective antivirus software around, often among the first to detect new viruses.

Kaspersky Anti-Virus doesn?t just find and remove malware, but also keeps an eye on potential security threats. The integrated vulnerability scan checks for system and application issues that should be addressed to reduce/eliminate vulnerabilities.

Kaspersky Anti-Virus is quite simple to use, with an easy interface and user-friendly navigation.

\newline

{\bf Webroot AntiVirus with SpySweeper Review}

Webroot AntiVirus with Spy Sweeper is a very comprehensive desktop antivirus package. The software protects from threats from several sources, and the several layers of protection keep thecomputer safe. Webroot protects PC?s from viruses in all forms, as well as worms, Trojans, malware, and rootkits.

\newline

Webroot monitors and detects all sorts of malicious files and just plain unwanted programs like adware, dialers, cookies, and keyloggers. The integrated Spy Sweeper is an amazing standalone anti-spyware software that in itself protects from a variety of computer threats. But more than just being on the defense, Webroot AntiVirus with Spy Sweeper also features proactive technology to find malware before it even has the chance to hit the computer.

The software is also ICSA approved, and certified from the West Coast Labs as an effective solution for desktop antivirus, anti-trojan, anti-malware, and antispyware.

\newline

{\bf Norton AntiVirus Review}

Norton AntiVirus 2010 does a great job of balancing system resources, simplicity, and (most importantly) security. The protection level is second to none.

Norton AntiVirus 2010 is a very impressive security solution, offering a complete lineup of robust features and a whole new approach to online security.

Norton?s huge (and growing) database of known malware will keep the computer safe from threats. One of the best parts about AntiVirus 2010 is the Norton Insight technology. This feature allows Norton to only scan the files that might be at risk, bypassing the trusted files and files that haven?t changed, so the scans don?t waste time and run significantly quicker.

Download Insight is specifically designed to stop new malware before user accidentally download it. Basically, Norton provides users with necessary information on any file immediately when user attempt to download it.

\newline

{\bf ESET Nod32 Antivirus Review}

Eset Nod32 Antivirus is a great desktop security solution, complete with effective protection and advanced features. Eset Nod32 is particularly useful for home users looking for a simple security software that they can simply install and let the software do the work for them.

Eset Nod32 integrates email protection to scan email for viruses and other malware. The antivirus software also protects users from auto-running external media (like USB drives) by scanning files when the external medium is plugged in.

Eset Nod32 Antivirus is equipped with the ability to create a bootable disc (or USB drive) in case of emergency. Working with the Microsoft Windows Automated Installation Kit, users will then be able to clean an infected or otherwise un-start-able computer.

\newline

{\bf AVG Anti-Virus Review}

AVG Anti-Virus is fully armed to protect the computer from threats from a number of angles. The software includes antivirus and antispyware protection, as well as complete online protection from harmful sites and downloads.

AVG protects from hackers, phishing scams, adware, and malware that comes through email or IM. AVG even scans outbound email to make sure users don?t accidentally pass a virus along to others. And of course the software protects from other forms of malware, including worms, Trojans, and rootkits.

\newline

AVG provides a number of compelling protective measures and security features. However, for those looking for the fastest antivirus, this AVG was one of the slower security solutions tested by AV Comparatives.

\newpage

\begin{figure}[h]

\begin{center}

\includegraphics[width=6in, height=9.0in]{pics_virus/antivirus.jpg}

\caption{Comparison of anti virus tools}

\label{av}

\end{center}

\end{figure}

\clearpage

\section {Conclusion}

There are various types of computer viruses exist in computer world. Newly created viruses come to play in every moment. Most of these viruses can detected by latest antivirus tools. Just need to identify what is the best antivirus tool for users environment.

Viruses can damage valuable data. But if users aware of virus symptoms easily can avoid those situations. So most effective way is the prevention from viruses before they entered into the computer. Everyone can get precautions that need to protect the system beforehand.

Even though virus is entered into the system, then no need to get anxious about that. Using better antivirus tool or getting some quick actions user can control the situation. In worst case, have to restore data or restore system. But ?Preventions is better than cure?. So precautions are always better things to do, than having a risk.

\newpage

\bibliographystyle{plain}

\begin{thebibliography}{}

\bibitem{1} Chen, T.(2004), {\it The Evolution of Viruses and Worms}, http://vxheavens.com/lib/atc01.html [Accessed: 25 May 2010]

\bibitem{2} Brian,M.(2001), {\it How Computer Viruses Work}, http://www.howstuffworks.com/virus.htm [Accessed: 25 May 2010]

\bibitem{3}Zetter, K. (2000), {\it How it works, Viruses }, http://www.pcworld.com/article/31002/how-it-works-viruses.html [Accessed: 25 May 2010]

\bibitem{4}Amon, L. (2000), {\it How to Identify Computer Virus Symptoms }, http://www.ehow.com/how-4903119-identify-computer-virus-symptoms.html [Accessed: 28 May 2010]

\bibitem{5}SECPOINT , {\it Top 10 Viruses }, http://www.secpoint.com/Top-10-Viruses.html [Accessed: 28 May 2010]

\bibitem{6} Maverick (2009), {\it Most Dangerous Computer Viruses of the Century}, http://www.boddunan.com/computers-a-technology/36-Security/6-most-dangerous-computer-viruses-of-the-century.html [Accessed: 5 June 2010]

\bibitem{7} TopTen Reviews (2010), {\it AntiVirus Software Review}, http://anti-virus-software-review.toptenreviews.com/./ [Accessed: 19 June 2010]

\end{thebibliography}

\end{document}

Need an essay? You can buy essay help from us today!

Please rate the quality of this essay:

Thanks for your rating :)


Struggling with your essay?

You can get your essay custom written by an expert in your subject area. Fully researched and referenced, the perfect model answer...

Get a quote here

Request the removal of this essay.

Source: http://www.ukessays.com/essays/computer-science/bf-series-virus-protection-computer-science-essay.php

Matt Smith Summer Jam 2013 the killing grant hill turkey Houston fire oklahoma

Sweeping Parts Of Southern Seas Could Become A Nature Preserve

The "Giant Tabular Iceberg" floats in Antarctica's Ross Sea in December 2011. Under a proposed new international agreement, large sections of the oceans around Antarctica would become protected as a marine preserve.

Camille Seaman/Barcroft Media/Landov

The area of ocean set aside as a nature preserve could double or triple in the coming days, depending on the outcome of a meeting in Germany. Representatives from 24 countries and the European Union are considering setting aside large portions of ocean around Antarctica as a protected area. And the deal may hinge on preserving some fishing rights.

There are two proposals on the table: One would set aside huge parts of the Southern Ocean around East Antarctica; the other would focus on the Ross Sea, south of New Zealand.

"The total size of the marine protected area we are proposing is roughly 3 1/2 times the size of Texas," says Ambassador Mike Moore, the former prime minister of New Zealand, who was talking up the joint U.S.-New Zealand proposal in Washington this spring. "So to misquote the vice president of the United States, 'this is a big deal.' "

Jim Barnes, who heads a conservation group called the Antarctic and Southern Ocean Coalition, says the Ross Sea area is one of the few relatively untouched regions left in the world's oceans. And it's rich in wildlife ? including the great whales, penguins, seals and albatrosses, he says. "Similarly, along the east Antarctic coast, [there's] another really great concentration of wildlife ? charismatic wildlife, as well as all the smaller [animals] that the food chain depends on."

But because these two areas are in international waters, creating marine preserves will require consensus from all of the nations in the pact known as CCAMLR, or the Commission for the Conservation of Antarctic Marine Living Resources.

The Australia-France-EU Proposal. This proposal for new marine protected areas "would conserve representative areas of biodiversity in the high latitudes of the Indian sector of the Southern Ocean," according to the Australian Antarctic Division.

Australian Antarctic Division

The Australia-France-EU Proposal. This proposal for new marine protected areas "would conserve representative areas of biodiversity in the high latitudes of the Indian sector of the Southern Ocean," according to the Australian Antarctic Division.

Australian Antarctic Division

When the group met to discuss the issue last fall, it couldn't reach agreement. Russia, China and Ukraine were concerned about losing fishing rights in these seas. But they agreed to the upcoming meeting in Germany to try again.

Barnes says one possible compromise is to have the protected-area designation expire after a number of years. Conservation-minded countries don't like that idea.

"It's like creating a national park," Barnes says, "and it shouldn't suddenly come to a halt. So that's one of the really contentious issues that remain."

Already the original proposal for the Ross Sea area has been revised to allow fishing in one part of the protected area, to satisfy nations that currently catch Antarctic toothfish.

But Karen Sack at the Pew Charitable Trusts says that's also a poor compromise because it would be very difficult to know whether fishing vessels are obeying the proposed fishing rules in this remote region.

"So we would hope that these countries would work together to recognize that for enforcement and for the integrity of the ecosystem it's important to close the entire area completely," Sack says.

It's one thing to create a park or preserve in an area that's not currently being used commercially. But there are established fisheries in this area, so the stakes are raised considerably.

"It's always difficult for countries to make a decision between short-term profits for industry and long-term benefits for the environment," Sack says.

The oceans as a whole are under threat from overfishing, marine pollution, ocean acidification and other stresses. Marine preserves can help alleviate that stress by providing refuge for some species under pressure.

So, global leaders have set an international target to designate 10 percent of the oceans for conservation. Right now about 1 percent of the ocean is protected ? thanks notably to President George W. Bush, who marked for conservation large areas of U.S. territorial waters around Hawaii and the Mariana Islands.

If all the areas currently under consideration for protection around Antarctica gain protected status, marine preserves could cover 3 percent of the world's oceans ? and be a big step toward the 10 percent goal.

Source: http://www.npr.org/2013/07/12/201170987/sweeping-parts-of-southern-seas-could-become-a-nature-preserve?ft=1&f=1007

Meteor Showers 2013 Darrelle Revis david ortiz record store day cnn News nbc news

Friday, July 12, 2013

NBA:(Video) Which NBA Team Did Rondo Say He Would NEVER Play For??

IFWT_rondo
An athlete should never say they wouldn?t play for a certain team, because you never know what the future may bring. But in Rondo?s case, he seems to be that much of an a**hole that I could see him retiring before playing for a team he didn?t want to. So if the defending champion Miami Heat ever want a better point guard to run their show, they better never try and trade for Rondo. That Celtics pride got him hating the Heat, literally. He answers the question about would he ever join the Heat and he answers very direct. Check the video after the jump.

@IamJOE357

Source: http://www.inflexwetrust.com/2013/07/12/nbavideo-which-nba-team-did-rondo-say-he-would-never-play-for/

Indianapolis explosion mike brown bcs rankings jay cutler applebees jeff gordon veterans day

Will union-bashing work in Minneapolis?

[unable to retrieve full-text content]

Source: mnprogressiveproject.com --- Thursday, July 11, 2013
We might find out. ? Minneapolis mayoral candidate Mark Andrew says the city is getting good service from its unionized trash collectors. ? But one of his opponents, Cam Winton, argues Minneapolis could save money by allowing non-Union companies to collect the city?s trash? ? Winton said the DFLers who dominate Minneapolis politics favor Union trash haulers for political reasons. ? ?Because the current city council and many of my opponents are part of this insider game of scratching each other?s backs, they seem to have no problem prioritizing the interests of this special interest over the interests of the broad array of Minneapolis residents who may be paying too much to have their garbage taken away each month,? Winton said. (MPR) Pretty free with the accusations, there. Privatization of government services, especially involving non-Union, low-wage workers, is no panacea. Quite the contrary. ? Mark Andrew is one of the front-runners in the race. Cam Winton is looking for traction, but by no means do I consider his campaign a lost cause, especially with ranked-choice voting. From an electoral standpoint, you gotta question this maneuver, though. ? As you may have deduced from the image I picked to use here, I strongly support unions and living wages and benefits. I?ll leave it at that. ? ...

Source: http://mnprogressiveproject.com/will-union-bashing-work-in-minneapolis/?utm_source=rss&utm_medium=rss&utm_campaign=will-union-bashing-work-in-minneapolis

anchorman sequel safety not guaranteed lifehouse al gore la dodgers lawrence o donnell magic johnson

GOP lawmaker criticizes Fallin over GRDA panel formation

By RANDY KREHBIEL World Staff Writer on Jul 11, 2013, at 2:24 AM??Updated on 7/11/13 at 2:48 AM

Doug Cox: The GOP state representative from Grove was adamant that he thought Gov. Fallin was ruling by executive order, comparing her actions to those of President Barack Obama.

VINITA - A Republican legislator lashed out at Gov. Mary Fallin on Wednesday, comparing her at one point to President Barack Obama and suggesting that her use of taxpayer-funded business incentives amounts to bribery.

"We all like to badmouth Washington, D.C., and we all enjoy badmouthing President Obama," said Rep. Doug Cox, R-Grove. "One of the things we say about him is that he is bypassing Congress and ruling by executive order.

"It seems to me we have a little bit of Washington, D.C., right here. Gov. Fallin is bypassing the Legislature and ruling by executive order."

"I have asked my neighbor to stop referring to the governor as 'Mary Hussein Fallin,' " Cox added.

Speaking at a GRDA board meeting Wednesday, Cox's remarks were in response to Fallin's order on Monday creating a 15-member GRDA task force whose members will be appointed by Fallin.

Cox said the GRDA employs 500 people in northeastern Oklahoma - including Cox's son - at no cost to taxpayers, while "the governor will spend tens of millions of dollars of taxpayer money ... to basically bribe companies to come to Oklahoma."

Fallin, the GRDA and GRDA's CEO Dan Sullivan have been at daggers since at least a year ago, when the GRDA bought an east Tulsa office building without consulting her.

More recently, she has made known her opposition to GRDA plans for a new natural gas-fired electricity-generation plant to replace the older of its two coal-fired plants.

Approval of a 400-megawatt, $450-million plant was to be voted on Wednesday, but the item was withdrawn from the agenda late Tuesday.

Fallin, her top troubleshooter, Preston Doerflinger, and Sullivan are to meet next week to discuss the matter.

Doerflinger, who attended Wednesday's meeting, said Cox's suggestion that Fallin intends to sell the GRDA or turn it into a "pot of gold" to pay for an income tax cut are not true.

"I didn't hear anything Doug said that was remotely close to the truth about the governor's motives," he said.

Doerflinger, whose official titles are state finance secretary and director of the Office of Management and Enterprise Services, has also been acting as energy secretary following the resignation of Michael Ming two months ago.

"When we finally make the appointments to this task force, I think people will see it's not going to be 15 Mary Fallins," Doerflinger said, referring to a Tulsa World editorial cartoon depicting just that.

Cox' outburst touched on something of a sore subject: the Fallin administration's aggressive consolidation of authority in the Governor's Office.

"It's the governor's job to be involved," Doerflinger said. "A lot of states are not used to such an active governor."

Certainly Oklahoma is not.

Historically, power has been concentrated in the Legislature and state agencies.

That said, Fallin is not the first governor to try to rein in the GRDA, a state agency that receives no tax dollars and has tended to operate with a high degree of independence.

Sullivan said progress is being made in resolving differences with the administration, despite Wednesday's decision to delay a vote on the new generating plant until at least August.

"The governor giving us a two-hour block of time next week is a sign of how important this is to her," he said.

Late Monday, the GRDA and the Governor's Office received a report from consulting engineers firm SAIC that generally supported the GRDA proposal as the most cost-effective option.

While directors did not vote Wednesday on the proposed new power plant, they did approve spending up to $17.3 million for engineering and construction management services related to major improvements to emissions controls on the newer of the GRDA coal-fired plants.

Those upgrades are expected to cost $86 million over the next three years. Doerflinger said Fallin has no objection to the upgrades.


Randy Krehbiel 918-581-8365
randy.krehbiel@tulsaworld.com

Original Print Headline: Lawmaker hits Fallin on GRDA

Only active print or digital subscribers of the Tulsa World are allowed to post comments on stories posted to Tulsaworld.com. After you fill out the form below and click submit, your comment will be published instantly online along with your screen name.

By clicking "Submit" you are agreeing to our terms and conditions.

Source: http://www.tulsaworld.com/article.aspx/GOP_lawmaker_criticizes_Fallin_over_GRDA_panel_formation/20130711_11_A1_ULNSbC119782?rss_lnk=12

Nick Foles Auguste Rodin Breaking Amish Indianapolis explosion mike brown bcs rankings jay cutler

Thursday, July 11, 2013

Lifeline For Pets Cat of the Week: Meet ?SAMMI? | Beacon Media News

100 3382

Little Sammi is a real sweetheart! His shiny, black fur is SO soft and sleek! Only 10 months old now, we rescued Sammi from an abusive situation. It took some vet care to get him healthy again, but now this little trooper has a clean bill of health, and is ready to have a much needed and loving forever home! He?s a great little guy and gets along well with other cats. He?s a rare black Siamese mix, and is a ?talker.? Please call to offer a secure, loving home to Sammi.

Call Shazi at 626-676-9505 or Kathy at 626-797-1753 for an adoption application or more information on this cat or any other cat on our website. See us in person most Sundays at Petsmart, 3347 E. Foothill Blvd. in Pasadena, 12:30-3:30 p.m.
Lifeline For Pets is a no-kill rescue organization operated solely by volunteers.
Lifeline For Pets website: www.lifelineforpets.org Click on ?Cat Pad? & scroll down to find this cat.
Facebook: www.facebook.com/lifelineforpets.pasadena Please ?Like? us and ?Share? to your animal-loving contacts.
Donation information is on our website.

Read the FULL STORY

Posted by BeaconBot on Jul 10th, 2013 and filed under Temple City News. You can follow any responses to this entry through the RSS 2.0. Responses are currently closed, but you can trackback from your own site.

Source: http://beaconmedianews.com/2013/07/10/lifeline-for-pets-cat-of-the-week-meet-%E2%80%9Csammi%E2%80%9D-3/

last train to clarksville tim tebow taylor swift post grad arpaio carol burnett neil degrasse tyson neil degrasse tyson

Japan Chair Platform: Abe?s Challenges Ahead

By Jeffrey W. Hornung

?Prime Minister Shinzo Abe of Japan has a lot to be happy about. In the recent Tokyo Metropolitan Assembly election, his Liberal Democratic Party (LDP) crushed all others, winning 59 seats to become the dominant party. This is important because it provides Abe and his party with a tailwind going into this month?s House of Councillors election in which the entire nation will have a chance to rate Abe?s performance after six months in office. If history is a guide, he should be optimistic. When the LDP won a landslide in Tokyo in 2001, it went on to win the House of Councillors election that followed. Similarly, the Democratic Party of Japan (DPJ) won big prior to the 2009 House of Representatives election. Currently, all polls indicate the LDP can expect a smashing victory. Yet, though the LDP?s victory will eliminate the ?twisted Diet? that befuddles Japanese politics, Abe should not expect smooth sailing come August. The issues on Abe?s agenda and the current state of affairs in the LDP mean that Abe?s next six months in office (and beyond) will be far tougher than his first.

Constitutional Revision
?

Consider constitutional revision. When Abe was previously premier, he advocated revision. This is largely because Japan?s constitution was written at the hands of American occupiers and lacks many elements that Abe believes lie at the heart of reviving Japan. Due to the short duration of his first administration, he was unable to act. This time, with a majority in the Lower House and an expected majority in the Upper House, Abe will finally have the votes to act.
?

Yet, revision generates uneasiness among the Japanese public, particularly because some of the areas targeted for revision are controversial. These include stipulating the emperor as the head of the nation, symbol of the nation and the people?s unity; allowing Japan to participate in collective self-defense; changing the name of the Self-Defense Forces to the National Defense Military; and deleting an article that guarantees human rights. Uneasiness does not end with the public. Many parliamentarians, including some within the LDP and coalition member New Komeito, also are hesitant. While many share the desire to revise an American-written document, the actual content of these revisions vary widely.
?

As a necessary first step forward, Abe advocated revising Article 96, which stipulates that any amendment to the constitution requires a two-thirds majority in both Diet chambers and majority support in a public referendum. Abe sought to require instead a simple majority in both Diet chambers because of known opposition within the LDP and New Komeito. While a simple majority would certainly make Abe?s job much easier in the Diet, it could possibly spark public outrage. Roughly one-fourth to one-third of the public supports Article 96 revision (34 percent in a June Yomiuri Shimbun poll; 25 percent in a May JNN poll). As such, if Abe pushes Article 96 revision, he can expect severe public opposition and possible failure.
?

Yet, if Abe does not revise Article 96, constitutional revision actually becomes more difficult. Until a few weeks ago, Abe was seeking ways around expected internal opposition by courting the Japan Restoration Party. But after its party leader Toru Hashimoto made off-color comments regarding comfort women and U.S. soldiers? need to frequent brothels in Okinawa, Hashimoto became persona non grata in Japan. It will be impossible for Abe to ally with Hashimoto for votes, meaning that obtaining two-thirds approval from parliamentarians will be a challenge.
?

In other words, if Abe seeks the easy way in the Diet, he angers the public. If he heeds public sentiment, his job in the Diet becomes difficult. Neither option is easy.
?

Nuclear Power
?

Similar to constitutional revision, Abe has chosen to tackle the sensitive topic of Japan?s nuclear energy policy. Japan currently maintains 50 functioning reactors, all but two of which remain idle. Previous DPJ administrations committed Japan to phasing out nuclear power by the 2030s, but Abe changed that. Since coming to power, he has not only advocated the restart of the idled reactors, but expressed his desire to build new plants and export nuclear technology. Toward this end, the Nuclear Regulation Authority announced an overhaul of the country?s nuclear safety guidelines, effectively starting a process that could allow some of Japan?s idled reactors to be restarted next year.
?

Yet, because of ongoing problems at the Fukushima Daiichi nuclear power plant, the Japanese public remains anxious about nuclear power. A June Asahi Shimbun poll showed that 59 percent oppose Abe?s plan to restart nuclear plants. Meanwhile, the Yomiuri Shimbun conducted a poll in February asking to what extent Japan should depend on nuclear energy. The largest response of 53 percent said that Japan should reduce its dependency below pre-March 11 status (which was around 30 percent). The public is even hesitant to export Japan?s nuclear technology abroad. A June JNN poll showed that 59 percent oppose these exports, mirrored by 58 percent opposed in an Asahi Shimbun poll the same month. This sentiment is reflected in public demonstrations as well. For example on March 10, more than 10,000 Japanese took to the streets of Tokyo (in addition to about 300 similar events throughout Japan) to protest nuclear power and Abe?s pro-nuclear agenda. Last month, more than 60,000 rallied in Tokyo against Abe?s intent to restart idled reactors. Importantly, this opposition to nuclear power is not limited to the public. There are many in the Diet, including the LDP, who oppose restarting idled plants. This was reflected in the LDP?s campaign promise to prioritize the development of renewable energy sources over nuclear power.
?

At the same time, Abe faces considerable pressure from the power industry, business community, and many within his LDP to restart the idled plants or, at the very least, export nuclear technology abroad. This is because Japan?s current energy shortfall requires a surge in energy fuel imports that have led to a trade deficit. Because of the weakened yen, this has meant a surge in import costs that, in turn, hurt the economy. As a means of pursuing economic stability, Abe has been pressured to restart the idled plants and provide non-fossil fuel-generated power.
?

With strong opposing sentiments, Abe will find it incredibly difficult to placate the desires of the business community and maintain strong public support. There is no win-win option for Abe.
?

Abenomics
?

Perhaps no other issue has dominated Abe?s agenda as much as economics. Rightly so, given that Japanese voters consistently cite economics as their top concern. Dubbed Abenomics, Abe has shot ?three arrows? (i.e., policies) to end deflation and kick-start economic growth: (1) fiscal stimulus; (2) monetary stimulus; and (3) structural reform. To its credit, Abenomics has achieved short-term success (e.g., a weakened yen, growth in the Nikkei, growth in manufacturing output, increased exports). All this translated into a 4.1 percent annualized gross domestic product growth rate from January to March.

Still, Abenomics is not without controversy. Recent weeks have seen erratic fluctuations in stock prices. A few weeks ago, the Nikkei stock average plunged, marking a reversal of the surge begun in April. The currency market shows similar volatility. Despite weakening to more than ?100 against the dollar, the yen recently began to strengthen. At one point, it even broke ?94. Similarly, despite massive monetary easing with the aim of reducing long-term interest rates, interest rates have increased. Most worrisome of all is the fact that Abenomics depends on large amounts of fiscal and monetary easing. Because Japan is already the most indebted country in the world (as a percentage of GDP), some experts worry that Abenomics will end in nothing but more bad debt.
?

Abe?s challenges are twofold. First, whether people will accept that short-term volatility and Abenomics actually generates long-term growth. This growth is to come from the ?third arrow? of structural reforms in areas such as labor, health care, agriculture, and energy. All of these industries have strong protective interest groups that Abe needs to overcome (along with bureaucrats and fellow LDP members) for his reforms to succeed. But simultaneously, he needs to rely on for his party?s victory in this month?s election.

Second, Abenomics? short-term success for businesses hurts the average Japanese consumer. While the yen has weakened and benefited export-oriented business, the price of imports has increased. People feel this in increased energy prices. For example, Japan?s 10 major power companies and 4 major city gas companies will raise their rates this summer because the prices of imported liquefied natural gas (LNG) and crude oil are increasing. Similarly, people are facing higher interest rates on securing loans. Unless salaries increase (which usually takes a long time to occur), consumer spending will slow, as the public feels its disposable income increasingly pinched. If Abe follows through on the consumption tax hike scheduled for April 2014, consumers will be hit hard and spending could stall. Yet if he postpones the increase, his commitment to fiscal discipline will be questioned.
?

Once again, Abe has no good choice. He has to depend on interest groups for victory this month but then face them in opposition for his long-term growth plans to succeed. Similarly, the success of his short-term plans may hurt consumers, which would hamper Abenomics? long-term viability.
?

The LDP
?

The aforementioned issues pose significant challenges for Abe, but his biggest challenges will be from his party. The first is his political base. Public support for Abe has remained high. In June, in Japan?s two major newspapers representing both sides of the political spectrum, his approval stood at 59 percent in the Asahi Shimbun and 67 percent in the Yomiuri Shimbun. Because a popular premier translates into popularity for the party, these numbers provide Abe a strong political base within his party. As long as Abe?s popular support remains high, perhaps somewhere above 50 percent, Abe?s remains invincible. Yet invincibility is not immortality. If Abe missteps on constitutional revision or nuclear power or if Abenomics runs into trouble, Abe?s popularity could swing violently downward, weaken his political base, and thus make him vulnerable. At that point, Abe would be forced into survival mode instead of focusing on his agenda. Managing an administration under siege would effectively kill Abe?s political agenda and, in most likelihood, his administration. To avoid this scenario, Abe has to properly prioritize his political agenda and conduct plenty of nemawashi (consensus building) with the public, interest groups, and his own party. In other words, go slow and spend political capital wisely.
?

But even this is not enough. Ironically, the success the LDP has enjoyed under Abe is his biggest challenge. There are close to 300 LDP Lower House members. Depending on the size of this month?s electoral victory, the LDP could grow to close to 400 members in both Diet chambers. This is an incredibly large party similar to the LDP?s heyday. This means the LDP is home to a wide array of opinions across the political spectrum. In other words, it is not a united party. In the past, the LDP was able to remain together because the faction system awarded key party/administration posts to members of each faction on a fairly regular basis, thereby making everyone happy. This spoils system no longer exists. While factions still exist, their power is negligible. What is more, by some accounts more than 120 LDP members today are not affiliated with any faction.
?

This is perhaps the biggest challenge for Abe. Currently, the LDP is united behind him as they head to the election. Dissent is minimized, especially because of his high approval rate. Yet, after the election when Abe is expected to reshuffle his cabinet and party posts, over 300 members of his party will not be able to enjoy a party/administration position. This will sow the seeds of dissatisfaction among many in the LDP, which could bear fruit if Abe?s approval rating sinks. Worse, as Abe tackles the contentious issues of constitutional reform and nuclear energy, opposing voices will begin to emerge. And this is only the start. Looking ahead, Abe?s calendar is filled with contentious issues that will cause real arguments in the LDP. This includes Trans-Pacific Partnership negotiations, social security reform, and the final decision on the April 2014 consumption tax hike. Keeping the LDP united in the coming months will be Abe?s greatest task.
?

Conclusion

Everyone is expecting that after this month?s election, when the LDP is expected to win big, the ?real Abe? or ?true Abe? will finally show his face. That is usually taken by the media to mean he will have full authority to pursue a rabid nationalist agenda that will poke China and South Korea in the eyes. What is being argued here is that Abe has other pressing challenges that are more important, so he will be forced to go slow on his agenda or risk his survival as premier. These challenges will most likely be domestic, meaning that while Abe?s views on history or territorial issues may anger his neighbors, they will probably have minimal consequence on his administration?s long-term survival. Winning the election is easy; governing Japan for the next three years is not.

?

Jeffrey W. Hornung is an associate professor at the Asia-Pacific Center for Security Studies in Honolulu, Hawaii, and an adjunct fellow with the Office of the Japan Chair at the Center for Strategic and International Studies in Washington, D.C. The views expressed in this article are those of the author and do not reflect the official policy or position of the Asia-Pacific Center for Security Studies, the U.S. Pacific Command, the U.S. Department of Defense, or the U.S. government.

__________________________________________________________________________________________________

?

Japan Chair Platform is published by the Office of the Japan Chair at the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).

? 2013 by the Center for Strategic and International Studies. All rights reserved.

Source: http://csis.org/publication/japan-chair-platform-abes-challenges-ahead

College World Series Alex Cobb superman flag day man of steel man of steel phil mickelson

Iran Jewish leader says Ahmadinejad views 'smug'

TEHRAN, Iran (AP) ? An Iranian Jewish activist is criticizing outgoing President Mahmoud Ahmadinejad for his remarks hailing his challenges over the extent of the Holocaust.

In rare public outrage by an Iranian Jewish leader, Haroun Yashaei was quoted Wednesday by the pro-reform Shragh newspaper as calling Ahmadinejad's recent comments "smug" and highly political.

On Sunday, Ahmadinejad boasted that he rattled Western taboos by calling for more historical research into the Nazi atrocities.

Yashaei, who heads the Tehran Jewish community, described Ahmadinejad's comments as offensive and said Jews were not sent to concentration camps for a "stroll."

There are about 30,000 Jews in Iran, which sets aside one parliament seat for a Jewish lawmaker.

Ahmadinejad, who leaves office in August, has often denounced Israel and says more non-Western research is needed into the Holocaust.

Source: http://news.yahoo.com/iran-jewish-leader-says-ahmadinejad-views-smug-081057351.html

epo suits PlayStation Network chip kelly NRA Golden Globes 2013 Sandy Hook conspiracy

Wednesday, July 10, 2013

Sony Siapkan Walkman E580 dan E380 untuk Saingi Apple iPod nano

Meski semakin banyak orang beralih ke smartphone sebagai sarana hiburan termasuk untuk memutar lagu MP3, Sony masih tetap berupaya untuk menjangkau ceruk pasar PMP (pemutar musik portabel) dengan dua produk terbarunya yaitu Walkman seri E580 dan E380. Keduanya juga dimaksudkan untuk bersaing dengan PMP lain seperti Apple iPod nano.

Sony Walkman E580 dan E380 merupkan pemutar musik, video dan foto. Walkman E580 memiliki layar 2 inci dengan baterai yang bisa bertahan hingga 77 jam dengan sekali pengisian daya. Sementara Walkman E380 memiliki layar 1,77 inci dengan ketahanan baterai hingga 30 jam.

Walman E580 disediakan dalam kapasitas 8GB dan 16GB yang bisa menampung hingga 3700 lagu. Selain MP3, E580 juga bisa memutar WMA, Linear PCM, AAC, HE-AAC, FLAC, dan audio Apple Lossless, video AVC, MPEG4, dan WMV 9. Selain itu juga disertakan earphone MDR-NC31 dengan peredam bising.

Sony Walkman E380 merupakan versi yang lebih kecil dengan versi 4GB dan 8GB yang bisa menyimpan 1950 lagu. E380 bisa memutar video hingga 4 jam meski hanya mendukung format WMV 9. Dukungan audionya juga terbatas dan tidak mendukung HE-AAC, FLAC, dan Apple Lossless.Selain itu Sony juga menyertakan sebuah headphone dan juga fitur radio FM.

Kedua produk akan mulai dijual di Eropa pada akhir bulan Juli 2013 ini. Belum ada informasi berapa harga jualnya.

via Slashgear

Source: http://feedproxy.google.com/~r/teknoup/~3/pIBzkrwlFE0/

hanley ramirez Christian Bale visits victims Christian Bale Sherman Hemsley Olympics Opening Ceremony Katherine Jackson Olympics Opening Ceremony Time

Obama honors Star Wars creator George Lucas | The Raw Story

By Agence France-Presse
Wednesday, July 10, 2013 17:58 EDT

?

President Barack Obama Wednesday honored luminaries of the arts, including Star Wars creator George Lucas, praising his special effects for freeing movies from ?planes in space? with visible strings.

Obama presented National Medals of Arts and National Humanities Medals to a group also including musician Herb Alpert, rhythm and blues legend Allen Toussaint, author Joan Didion and sportswriter Frank DeFord.

?The arts and the humanities aren?t just a source of entertainment, they challenge us to think and to question and to discover, to seek that inward significance ? and that helps us grow and to change and to reach new heights,? Obama said at a White House ceremony.

The president went off script when he came to pay tribute to Lucas, praising him for making ?it look like those planes in space are actually flying.?

?I remember when I first saw Star Wars ? there?s a whole generation that thinks special effects always look like they do today,? Obama said, prompting chuckles among audience members.

?But it used to be, you?d see, like, the string on the little model spaceships. Anyway, I?m being led astray.?

Those receiving the Medal of Arts included Alpert, philanthropist Lin Arison, dancer Joan Myers Brown, singer Renee Fleming, author Ernest Gaines, painter Ellsworth Kelly, scriptwriter Tony Kushner, Lucas, comedian Elaine May, architect Laurie Olin, Toussaint and the Washington Performing Arts Society.

National Humanities Medal recipients were author Edward Ayers, economist William Bowen, historians Jill Ker Conway and Natalie Zemon Davis, Deford, Didion, political scientist Robert Putnam, writer Marilynne Robinson, poet Kay Ryan, book critic Robert Silvers, actress Anna Deavere Smith and writer-photographer Camilo Jos? Vergara.

Like Raw Story on Facebook

?

?

?

?

?

Source: http://www.rawstory.com/rs/2013/07/10/obama-honors-star-wars-creator-george-lucas/

UFC 151 empire state building prince harry Hurricane hunger games Joey Kovar Expendables 2

Tuesday, July 9, 2013

Fujitsu India Launches High Performance Computing Solutions

Hi! Could you share your feedback about our News section to help us improve?

Q1) What kind of news do you like reading the most?

?

Q2) What can we do to improve your reading experience?

Q3) What other news and features would you like us to cover?

Q4) Which other Indian content sites do you use?

Source: http://feedproxy.google.com/~r/si-enterpriseit/~3/pIcK4VJSfS0/Fujitsu-India-Launches-High-Performance-Computing-Solutions-nid-150062-cid-7.html

tony stewart kurt busch kurt busch nba dunk contest 2012 act of valor woody guthrie benson henderson

Venture capital for online travel startups: Lists of leading investors ...

NB: Hot on the heels of Alex Bainbridge?s opinion piece yesterday ?Dear travel industry, we desperately need more mentors for budding entrepreneurs. Thanks!?, we feature this related analysis on sources of startup capital.

This is a viewpoint from?David Ambrose, who serves as senior director, mobile and social at Travelzoo and who previously founded Scoop St. (He blogs on startup topics at data.insights.ideas.)

A boom in travel startups

Over the last six months, I?ve begun to notice emerging patterns in online travel and one that?s ideal for founders looking to attract capital.

If you speak to anyone in the travel and hospitality vertical, especially those from the early dot-com days, there are whispers of a renaissance in the marketplace.

Building a travel company is cool again, even with the known hardships that acquiring customers is expensive, incumbents have firm footholds in legacy categories, there are high switching costs for customers, etc.

Earlier this year, we?ve seen unbelievable advances in how younger companies are growing and attracting capital in the online travel space:

The appetite to create and fund early stage travel companies is even visible on AngelList, with the category attracting more than 46,000 followers ? one of the largest on the entire network.

Why travel is hot

The growth in ways to research and purchase travel in the last 15 years has been unprecedented.

That?s good news for consumers, but it also is good news for solutions builders (the entrepreneurs in the room) because it means their addressable B2B and B2C market is stunningly fantastic at triple digit billions (US alone).

The market includes online travel agents (OTAs), metasearch engines, mobile-first booking tools, day-of-travel planning apps, social travel research tools, and deal sites.

Not as soul-crushing as usual

For those of you reading with an entrepreneurial edge, you understand that one of most difficult (at times, soul-crushing) events in your journey of building a business is looking to attract startup capital.

The process for doing so can become all encompassing, and more worrisome, detracting from growing the company.

As a first-time entrepreneur, I remember spending two months of 2008 on Sand Hill Road pitching investors with just A3 paper full of sketches, projections and nothing more than a core idea.

Needless to say, no money came from that trip and I lost time I wished I could have recouped.

Looking back, I realized I did not have a good process to identify the right investors by objective criteria (their location, their investment focus or their investment sizes) or subjective standards (previous lives as founders, similar backgrounds to myself or what they tweet about).

I learned a lot by founding Scoop St,??a local commerce company that was acquired in 2011.

Database of leading travel investors

It?s why anyone looking to build (or building) an online business in the travel or hospitality market should bookmark the lists below, as I?ll be updating the following regularly.

Earlier this year, I did research collecting four categories of investors who focus almost exclusively in this market or at least, have a previous interest in it (either by founding a company, advising or investing in earlier travel businesses).

My Google Docs list, viewable as a webpage at Travel + Hospitality Venture Capital, is organized by name of investor (angel, fund or accelerator), associated notes (i.e. previous role, what company the individual founded or investments), location and how to get in touch.

I?ve also created a Twitter list of investors in travel and hospitality that you can follow. (Am I missing anyone? Shoot me an e-mail or a tweet.)

venture capital travel online startups

Insights into venture capital in digital travel

If you dig a bit deeper into these lists, some unique patterns begin to emerge as you look to raise capital.

  • Deep Industry Angel Network:?For instance, Sam Shank, Brad Gerstner, Gregg Brockway, Hugh Crean,?and Erik Blachford are notable angels with a track record of operating big, meaningful travel businesses in a prior (or current) life.
  • Limited Institutional Funds, But Giants of General Catalyst and Thayer Ventures: While the online travel market is very large, only one dedicated fund focuses exclusively on the vertical (Thayer Ventures) compared to one partner, Joel Cutler, at General Catalyst Partners picking up notable deals.
  • More Investing from the Balance Sheet: Corporate development and M&A groups at companies like Travel Channel are funneling investment into younger companies (i.e. Oyster) for added value, while Priceline.com and Concur look to operate dedicated investment funds.
  • Few, Travel Category Launchpads: Incubators and accelerators look to be few and far between, with one in Colombia (Torrenegra?Labs) and another in the middle of the United States (RunUpLabs?? see Tnooz?s story on this one).

My intent with this post is to help you, the entrepreneur, paint a better and bigger picture of what the travel venture space looks like throughout the United States and beyond.

Look to identify the types and stages of companies each investor bets on, research their backgrounds and ultimately, see if someone in your network knows one another for a solid introduction or rely on calculated hustle.

NB: This is a guest article from David Ambrose, who oversees mobile and social at Travelzoo and who previously founded Scoop St.. He blogs on startup topics at data.insights.ideas.

Related posts:

  1. Venture capital funds bulk up for hospitality technology disruption
  2. DealAngel, a TechStar, raises $750K from 2 Russia venture capital firms
  3. Yatra raises $44M, India becoming hotbed of action for investors

Source: http://www.tnooz.com/2013/07/09/news/venture-capital-for-online-travel-startups-lists-of-leading-investors/

RG3 nfl playoff schedule Rex Ryan tattoo Alaska earthquake houston texans houston texans green bay packers

American hacked to death over $1.60 cab fare, Thai police say

AP

Chidchai Utmacha, right, shows how he stabbed Troy Lee Pilkington during a police re-enactment in Bangkok on Sunday.

By Henry Austin, NBC News contributor

A taxi driver hacked an American to death after an argument over a $1.60 fare, Thai officials said late Sunday.

Troy Lee Pilkington, 51, was repeatedly slashed with a 12-inch machete on Saturday night, according to Bangkok police. ?

Police Lt. Col. Teerayut Maiplaeng said the suspect told them that Pilkington, who had lived in the country for three years, accused him of rigging the meter as they sat in traffic on the city?s busy Sukhumvit Road.

The victim allegedly stormed out of the cab and refused to pay the 51 baht ($1.60) fare.

The suspect claimed when he asked for the money, the American threw a cup of coffee at him, after which he pulled the knife from his trunk and chased after Pilkington.

Video footage from a nearby surveillance camera captured part of the struggle and shows the taxi driver wildly swinging a machete as the other man flails his arms and tries to grab the driver.

The suspect told police he panicked and that Pilkington, who?worked for the American machinery company Caterpillar Inc., fell to the ground but he did not think that he would die, according to the Bangkok Post.?

After the attack, the suspect dumped the machete into a canal and threw away his shirt, the Post reported.?

Chidchai Utmacha, 32,?was arrested him on charges of murder and carrying a weapon in public without reasonable cause.

Reuters and The Associated Press contributed to this report.??

?

This story was originally published on

Source: http://feeds.nbcnews.com/c/35002/f/663309/s/2e5a7c3c/l/0Lworldnews0Bnbcnews0N0C0Inews0C20A130C0A70C0A80C193469620Eamerican0Ehacked0Eto0Edeath0Eover0E160A0Ecab0Efare0Ethai0Epolice0Esay0Dlite/story01.htm

jessica simpson gives birth carrie underwood blown away chk ryan seacrest beltane ryan o neal dark knight rises trailer

Andy Murray Wimbledon victory sparks global Twitter frenzy

Andy Murray's Wimbledon final victory over Novak Djokovic has sparked a global frenzy on Twitter.

The Briton's 6-4, 7-5, 6-4 defeat of the world number one inspired messages from as far afield as Iran, Nigeria and Brazil, according to social media analysts Synthesio.

Great Britain's Andy Murray celebrates

The majority of Murray-related tweets came from around the UK, but Synthesio monitored a further 11,000 from India, 4,712 from Nigeria, 2,032 from Malaysia, more than 1,000 from Brazil, and even 200 from Iran in support of the Scot.

Analysis of online conversations held over Facebook, blogs, forums and the comments sections of media outlets suggests that 90% of posts about the tennis player were positive in the wake of his Wimbledon triumph.

Murray's straight-sets win saw him become the first British man to win the tournament since Fred Perry in 1936.

The athlete has now been tipped for a knighthood in the next Queen's honours list.

Photo gallery - celebrities watching the men's Wimbledon final:

Celebrities at the Mens Wimbledon Final 2013

James Middleton and Donna Air arrive at Wimbledon for the Men's final.

1 of 13

Source: http://rss.feedsportal.com/c/32545/f/492401/p/1/s/46a3bae3/l/0L0Sdigitalspy0O0Ctech0Cnews0Ca4965420Candy0Emurray0Ewimbledon0Evictory0Esparks0Eglobal0Etwitter0Efrenzy0Bhtml0Drss/story01.htm

smokey robinson USA VS Mexico Alexis DeJoria Marshall Henderson Tubby Smith opm passover