This text is replaced by the Flash content.


Survival Tips

En Español

Did You Know That...

1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.

Galveston TX Hurricanes

Average Brushed or hit every 2.94 years
Average Direct hit every 8.63 years

The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents
Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000

The 1915 Storm, August 17th, Category 4 @ 135 mph
42    people dead in the Galveston area
$60 - 1915 million dollars in damage

Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States
Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.

Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars

Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history

Nuclear Issues

Chernobyl, An Experiment Gone Wrong

On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded.
Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.

Five U.S. nuclear reactors in earthquake zones

Status of the Nuclear Reactors at the Fukushima Daiichi Power Plant

How a Reactor Shuts Down and What Happens in a Meltdown

Hazards of Storing Spent Fuel

Timeline: Nuclear Plant Accidents

Why the Fukushima disaster is worse than Chernobyl

In graphics: Fukushima nuclear alert

Fukushima victims: homeless, desperate & angry

Japan Panel: Fukushima nuclear disaster "man-made"

More, Did You Know That


File Formats Help:
File Formats Frequently Used on the Survival Insights Portal

Products - Services

I T: More Information Technology & Security Topics
Posted on Saturday, February 06 @ 13:26:20 PST by editor

Social Media Use Tied to Increase in Malware Infections
    playgrounds for attackers, spammers and others.-

Hosting provider InMotion hacked
    Thousands of sites affected.-

Security Expert: U.S. 'Leading Force' Behind Stuxnet
    cyber-superweapon might harm those who created it.-

Troubling Cracks Showing in Internet's Security Foundation
    inherent problems of the protocol -

Japan's defense industry hit by its first cyber attack
    some information could have been stolen -

Computer-based attacks emerge as threat of future
    more attacks that destroy entire systems -

Report warns U.S. unprepared for cyber attacks
    The businesses community has failed to understand that -

How Online Privacy Has Become an Oxymoron
    Americans have surrendered their privacy -

Microsoft online services hit by major failure
    Hotmail, Office 365, & Skydrive affected -

Wireless Phone Networks Stood Up Well to Hurricane
    despite widespread losses of power. -

Hackers Hijack Websites In Online Pharmacy Scam
    redirected to illicit online drug sellers -

Securing Mobile Devices?
    May Be an Impossible Task -

Revealed: Operation Shady Rat
    Taken aback by the audacity of the perpetrators -

Don't Say I Never Told You
    Congress Warned Of Stuxnet Variants -

The Next Security Scandal
    An Attack on High Frequency Trading Systems -

Anatomy of an Inventive DR Plan
    The A Team -

Who Else Wants to Understand?
    The 3 Types of Cloud Computing -

DHS warns utilities at risk from insider threats
    terrorists could be targeting major facilities -

Pentagon Strategy Prepares For War In Cyberspace
    A cyberattack on the U.S. could prompt a military response -

U.S. House Committee
    Questions Ability to Secure Wall Street Data -

Pentagon Discloses Massive Data Theft
    Lays Out New Security Strategy -

Report, US Hosting Providers
    Infested with Malware, Botnets -

Washington Post Hacked
    1.27M IDs and E-mail Addresses Stolen -

Morgan Stanley Smith Barney Breach
     Loses Information of 34,000 -

Citigroup Computer Breach
    Hackers access Customer Data, Company Confirms -

Amazon’s Trouble Raises Cloud Computing Doubts
     a wake-up call for cloud computing -

I've Been Hacked! Now What?
    How to Turn Your Zombie PC Back to Normal -
Epsilon Data Breach Expands
    Capital One, Disney and others hit -
Sites hit in massive web attack
    Hundreds of thousands of websites compromised -
HIPAA Bares its Teeth
    $4.3m Fine for Privacy Violation -
Cyberweapon could cause Internet doomsday
    What will it take? -
Anonymous Hackers Release Stuxnet Worm Online
    it could lead to something bad, soon -
New Hacking Tools Pose bigger Threats to WI-FI Users
    Web site Administrators scrmblimg -
Malicious Spam Jumps to 3 Billion Messages Per Day
    upwards of 90 % of all email messages-
McAfee: China leads world in hacked computers
    US the most vulnerable to cyberattack-
Critical Infrastructure Twice as Likely
    to be targeted by Cybercriminals-

Cyber attacks against Australia 'will continue'
    Australian government websites blocked- BBC.News

U.S. at Risk of Crippling Cyber Attack
    The Changing Threat - ODNI Assessment

Google Attack Was Tip of the Iceberg
    networks had been thoroughly compromised -

One in Every 150 Legitimate Sites Infected by Malware
    reached unprecedented levels in 2009 -

If Your Password is 123456, Just Make it HackMe
    like leaving a key under the doormat -

5 easy ways to speed up your computer
    boost your desktop or notebook PC's speed and performance - HP

Taking Data Protection to the Edge - Iron Mountain
    Protection Must Cover Today's Mobile, Extended Enterprises

20 Questions to Ask Your Supplier About Voice Over IP
    Before You Buy

Related Links
· More about
· News by editor

Most read story about :
May 2009 Tip of the Month

Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Very Good


Associated Topics

Information Technology

Sorry, Comments are not available for this article.
Home  ::  Search  ::  Feedback  ::  Top 10  ::  Contact Us © 2007 • Privacy PolicyTerms Of Use