This text is replaced by the Flash content.


Survival Tips

En Español

Did You Know That...

1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.

Galveston TX Hurricanes

Average Brushed or hit every 2.94 years
Average Direct hit every 8.63 years

The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents
Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000

The 1915 Storm, August 17th, Category 4 @ 135 mph
42    people dead in the Galveston area
$60 - 1915 million dollars in damage

Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States
Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.

Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars

Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history

Nuclear Issues

Chernobyl, An Experiment Gone Wrong

On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded.
Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.

Five U.S. nuclear reactors in earthquake zones

Status of the Nuclear Reactors at the Fukushima Daiichi Power Plant

How a Reactor Shuts Down and What Happens in a Meltdown

Hazards of Storing Spent Fuel

Timeline: Nuclear Plant Accidents

Why the Fukushima disaster is worse than Chernobyl

In graphics: Fukushima nuclear alert

Fukushima victims: homeless, desperate & angry

Japan Panel: Fukushima nuclear disaster "man-made"

More, Did You Know That


File Formats Help:
File Formats Frequently Used on the Survival Insights Portal

Products - Services

Human Concerns: Workplace Violence Is Real
Consultant's Perspective...

Merely having a workplace violence prevention policy does not do enough to address the need. Proactive prevention strategies must include new employee orientations and continuing education at all levels of the organization. Such proactive measures must not sugar coat the realities by pretending there are no problems, avoiding to address past incidents and how they were resolved as valued-added prevention training, identification of risk factors, recognition of hazards, reporting and proper assessment of at risk situations. Training though helpful must not be the end to the means, it must be supported by a range of programs including ongoing physical security and personnel assessments, conduct accountability, leadership responsibilities and consequences.

Human Concerns: I have a dream!

Human Concerns: El Internet, un Mar Peligroso de Navegar

Human Concerns: California Wildfires

Thousands ordered to evacuate

Human Concerns: 40 Million Credit & Debit Card Numbers Stolen

Human Concerns: The Smart-Phone Attitude

Human Concerns: Coming to your Neighborhood?
A Ban on Multi-tasking while Walking?

Human Concerns: Prepare for the Next Flood

Human Concerns: Contributing Factors of Workplace Violence
By Felix Nater

Human Concerns: Enhance Your PC Security

Thinking About Securing Your Home Computer?

Things you ought to know to prevent your computer from being hijacked or become a target for intruders.

Intruders are after your personal information, your computer's resources, meaning your harddisk (containing your stored personal information), your fast processor and your internet connection. They use these resources to access and attack other computers on the Internet.

Home computers are typically not very secured, have vulnerabilities and are easy to break into to gain access to these resources.

Home computer owners do not realize how exposed their data is, if they do not exercise due care to protect their computer or block an attack.
By being aware and taking some preventive measures you can minimize your exposure and improve the security of your home computer.

The issues and vulnerabilities are the same regardless of the operating system you utilize to run your computer and will remain so as new versions are released.

You need to know that all types of communications and information sent across the Internet or exchanged between computers (email, messaging, voice etc) is not concealed or hidden in any way. Information may be exposed or at risk of others listening in or capturing data patterns that may provide valuable information to access your computer. Once inside they may try to steal your information, use it to harm your computer or gain access to other computers.

Viruses, worms, trojan horses and other malware can reach your computer in many ways, through email, web sites, memory sticks, CD-ROMs and downloaded files. They all need to be checked for viruses every time you use them.

Securing your home computer is not a trivial task. There are many aspects to consider and many steps to follow.

Here are some suggestions you may want to implement:

Human Concerns: Home Computer Security
Home Computer Security - Firewalls

What are some of the issues with security and protection of your personal data.

Human Concerns: Your Family Disaster Plan

Human Concerns: Human Concerns
Main Menu Your Family Disaster Plan
    Disasters can strike fast and without warning. A surprise?
Contributing Factors of Workplace Violence
    Are You Reading the Writings on the Wall
Home Computer Security
    Home Computer Security. Is your data safe?
FDIC - Don't Be an On-line Victim
    How to Guard Against Internet Thieves and Electronic Scams .

Products / Services



Home  ::  Search  ::  Feedback  ::  Top 10  ::  Contact Us © 2007 • Privacy PolicyTerms Of Use