1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.
Galveston TX Hurricanes
Average Brushed or hit every 2.94 years Average Direct hit every 8.63 years
The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000
The 1915 Storm, August 17th, Category 4 @ 135 mph 42 people dead in the Galveston area
$60 - 1915 million dollars in damage
Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.
Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars
Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history
Chernobyl, An Experiment Gone Wrong
On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded. Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.
Human Concerns: Enhance Your PC Security
Posted on Thursday, September 20 @ 12:34:24 PDT by admin Thinking About Securing Your Home Computer?
Things you ought to know to prevent your computer from being hijacked or become a target for intruders.
Intruders are after your personal information, your computer's resources, meaning your harddisk (containing your stored personal information), your fast processor and your internet connection. They use these resources to access and attack other computers on the Internet.
Home computers are typically not very secured, have vulnerabilities and are easy to break into to gain access to these resources.
Home computer owners do not realize how exposed their data is, if they do not exercise due care to protect their computer or block an attack.
By being aware and taking some preventive measures you can minimize your exposure and improve the security of your home computer.
The issues and vulnerabilities are the same regardless of the operating system you utilize to run your computer and will remain so as new versions are released.
You need to know that all types of communications and information sent across the Internet or exchanged between computers (email, messaging, voice etc) is not concealed or hidden in any way. Information may be exposed or at risk of others listening in or capturing data patterns that may provide valuable information to access your computer. Once inside they may try to steal your information, use it to harm your computer or gain access to other computers.
Viruses, worms, trojan horses and other malware can reach your computer in many ways, through email, web sites, memory sticks, CD-ROMs and downloaded files. They all need to be checked for viruses every time you use them.
Securing your home computer is not a trivial task. There are many aspects to consider and many steps to follow.
Here are some suggestions you may want to implement:
- Make it difficult for hackers to decipher your password.
- Create unique strong passwords by using a combination scheme of letters, both upper and lower case and numbers.
- Make passwords more than eight characters long and change regularly.
- Be creative and practical. You need to remember it without having to write it down.
- Do not share passwords with anyone
- Do not open emails and/or attachments if you do not recognize the sender no matter how curious you are or how enticing and provocative the subject.
- Do not respond to suspicious introductory emails
- Report and delete Spam without opening it
- Programs you ought to install:
- Add a firewall, install antivirus programs, add file encryption
- Maintain program patches on all software up-to-date.
- Registering software when you install it, gives the vendor the information they need to contact you if there is a recall or to send patches.
- Schedule periodic virus scanning of all your computer files on a regular basis.
- Know where the file to be downloaded is coming from.
- Buy from stores that you know or distributors with an established reputation.
- Clean up cookies and temporary files.
- Backup and protect your data.
- Make backups of important files and folders regularly or when they have changed.
- Store them safely in a fireproof container away from your computer.
- Make extra copies and record important information to identify what is backed up and when it was created.