1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.
Galveston TX Hurricanes
Average Brushed or hit every 2.94 years Average Direct hit every 8.63 years
The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000
The 1915 Storm, August 17th, Category 4 @ 135 mph 42 people dead in the Galveston area
$60 - 1915 million dollars in damage
Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.
Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars
Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history
Chernobyl, An Experiment Gone Wrong
On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded. Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.
Small Businesses: This is a very serious issue
Posted on Wednesday, May 28 @ 21:05:46 PDT by editor
For most of us, Personal Computers (PCs) have become a part of our everyday life and we depend on them on everything we do; from entertainment, news, weather information, email, online banking, stock transactions, balancing our budgets, airline reservations, communications, Instant Messenger - tasks and activities that could not be done without the convenient assistance of Personal Computers.
Things you ought to know
Whether you know it or not, for every keystroke, email you send, business transaction and internet sites you visit, your PC keeps track of and stores somewhere in it’s hard-disk information of all these activities or transactions. Unless you have made specific provisions to consciously secure your computer, all that “confidential” information is exposed to be had by criminals.
With so many applications running on PCs and increasing amounts of information stored in them, it is no wonder that the hard disks in PCs have become the target for intruders. Professional hackers and corporate criminals target large corporate systems where their payoff and effort may be worthwhile, however, individuals armed with a PC, some basic programs and technological knowledge are out there today “phishing” “spoofing” for your PC’s personal information.
Security breaches of businesses and government systems are rising in alarming numbers. We can only assume that our personal information is exposed. Breaches in data security are happening today and getting worse, with no solution in sight.
It will be of little condolence if you have already been a victim, however for those “sitting ducks” oblivious to what is happening; there is some help if you act to protect your PC and your personal information.
It is also a fact that you need computer knowledge, antivirus s/w, h/w, update/patches, firewalls etc.. While we can do little or nothing to secure corporate and government systems you should take advantage of certain tools you can use and practices you can implement today to secure your own PCs and minimize and/or prevent being a victim
Most current computer software comes with utilities and software that you should know how to activate or consider learning to enjoy some peace of mind. From passwords to firewalls, from backups to encryption and the implementation of certain practices and steps needed to protect you from this current plague of unimpeded criminal behavior.
You will improve the chances of your PC staying secure after assessing and determining (depending on how your PC is used and/or shared) how and where you are at risk by learning and informing yourself.
If you do not have the time to invest to learn about these sometimes complicated software programs, hiring a consultant to assess the risk, and activate and install “Good Ware” and protections may be your best bet to protecting your privacy and your personal information.