This text is replaced by the Flash content.

Resources

Survival Tips

En Español

Did You Know That...


1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.



Galveston TX Hurricanes

Average Brushed or hit every 2.94 years
Average Direct hit every 8.63 years

The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents
Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000

The 1915 Storm, August 17th, Category 4 @ 135 mph
42    people dead in the Galveston area
$60 - 1915 million dollars in damage

Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States
Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.

Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars

Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history


Nuclear Issues

Chernobyl, An Experiment Gone Wrong

On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded.
Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.

Five U.S. nuclear reactors in earthquake zones
usatoday.com


Status of the Nuclear Reactors at the Fukushima Daiichi Power Plant
NYTimes.com


How a Reactor Shuts Down and What Happens in a Meltdown
NYTimes.com


Hazards of Storing Spent Fuel
NYTimes.com


Timeline: Nuclear Plant Accidents
BBCNews.com


Why the Fukushima disaster is worse than Chernobyl
independent.co.uk


In graphics: Fukushima nuclear alert
bbc.co.uk


Fukushima victims: homeless, desperate & angry
reuters.com


Japan Panel: Fukushima nuclear disaster "man-made"
bbc.co.uk.com






More, Did You Know That


Downloads


File Formats Help:
File Formats Frequently Used on the Survival Insights Portal



Products - Services





I T: More Information Technology & Security Topics
Posted on Saturday, February 06 @ 13:26:20 PST by editor






Social Media Use Tied to Increase in Malware Infections
    playgrounds for attackers, spammers and others.- threatpost.com

Hosting provider InMotion hacked
    Thousands of sites affected.- threatpost.com

Security Expert: U.S. 'Leading Force' Behind Stuxnet
    cyber-superweapon might harm those who created it.- npr.org

Troubling Cracks Showing in Internet's Security Foundation
    inherent problems of the protocol - threatpost.com

Japan's defense industry hit by its first cyber attack
    some information could have been stolen - news.yahoo.com

Computer-based attacks emerge as threat of future
    more attacks that destroy entire systems - washingtontimes.com

Report warns U.S. unprepared for cyber attacks
    The businesses community has failed to understand that - hsnw.com

How Online Privacy Has Become an Oxymoron
    Americans have surrendered their privacy - threatpost.com

Microsoft online services hit by major failure
    Hotmail, Office 365, & Skydrive affected - bbc.co.uk

Wireless Phone Networks Stood Up Well to Hurricane
    despite widespread losses of power. - nytimes.com

Hackers Hijack Websites In Online Pharmacy Scam
    redirected to illicit online drug sellers - npr.org

Securing Mobile Devices?
    May Be an Impossible Task - threatpost.com

Revealed: Operation Shady Rat
    Taken aback by the audacity of the perpetrators - Mcafee.com

Don't Say I Never Told You
    Congress Warned Of Stuxnet Variants - threatpost.com

The Next Security Scandal
    An Attack on High Frequency Trading Systems - threatpost.com

Anatomy of an Inventive DR Plan
    The A Team - blog.fibertown.com

Who Else Wants to Understand?
    The 3 Types of Cloud Computing - blog.fibertown.com

DHS warns utilities at risk from insider threats
    terrorists could be targeting major facilities - hsnw.com

Pentagon Strategy Prepares For War In Cyberspace
    A cyberattack on the U.S. could prompt a military response - npr.org

U.S. House Committee
    Questions Ability to Secure Wall Street Data - threatpost.com

Pentagon Discloses Massive Data Theft
    Lays Out New Security Strategy - threatpost.com

Report, US Hosting Providers
    Infested with Malware, Botnets - threatpost.com

Washington Post Hacked
    1.27M IDs and E-mail Addresses Stolen - threatpost.com

Morgan Stanley Smith Barney Breach
     Loses Information of 34,000 - threatpost.com

Citigroup Computer Breach
    Hackers access Customer Data, Company Confirms - AOLNews.com

Amazon’s Trouble Raises Cloud Computing Doubts
     a wake-up call for cloud computing - NYTimes.com

I've Been Hacked! Now What?
    How to Turn Your Zombie PC Back to Normal - About.com
Epsilon Data Breach Expands
    Capital One, Disney and others hit - threatpost.com
Sites hit in massive web attack
    Hundreds of thousands of websites compromised - BBCNews.com
HIPAA Bares its Teeth
    $4.3m Fine for Privacy Violation - threatpost.com
Cyberweapon could cause Internet doomsday
    What will it take? - hsn.com
Anonymous Hackers Release Stuxnet Worm Online
    it could lead to something bad, soon - foxnews.com
New Hacking Tools Pose bigger Threats to WI-FI Users
    Web site Administrators scrmblimg - NYTimes.com.com
Malicious Spam Jumps to 3 Billion Messages Per Day
    upwards of 90 % of all email messages- threatpost.com
McAfee: China leads world in hacked computers
    US the most vulnerable to cyberattack- hsnw.com
Critical Infrastructure Twice as Likely
    to be targeted by Cybercriminals- ScanSafe.com

Cyber attacks against Australia 'will continue'
    Australian government websites blocked- BBC.News

U.S. at Risk of Crippling Cyber Attack
    The Changing Threat - ODNI Assessment

Google Attack Was Tip of the Iceberg
    networks had been thoroughly compromised - threatpost.com.com

One in Every 150 Legitimate Sites Infected by Malware
    reached unprecedented levels in 2009 - threatpost.com.com

If Your Password is 123456, Just Make it HackMe
    like leaving a key under the doormat - NYTimes.com

5 easy ways to speed up your computer
    boost your desktop or notebook PC's speed and performance - HP

Taking Data Protection to the Edge - Iron Mountain
    Protection Must Cover Today's Mobile, Extended Enterprises

20 Questions to Ask Your Supplier About Voice Over IP
    Before You Buy



 
Related Links
· More about
· News by editor


Most read story about :
May 2009 Tip of the Month


Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Excellent
Very Good
Good
Regular
Bad


Options

Associated Topics

Information Technology

Sorry, Comments are not available for this article.
Home  ::  Search  ::  Feedback  ::  Top 10  ::  Contact Us
SurvivalInsights.com © 2007 • Privacy PolicyTerms Of Use