Saturday, December 02, 2006


Visit Manoj's Blog for more fun..........


HIV




What is HIV?
HIV stands for the Human Immunodeficiency Virus. HIV attacks the body’s immune system - the body’s defence against diseases. HIV, if detected early, can be treated very successfully. With treatment, people living with HIV will probably have a normal lifespan, although serious health problems may still occur.

What is AIDS?
AIDS stands for Acquired Immune Deficiency Syndrome. A person is considered to have AIDS when the immune system has become so weak that it can no longer fight off a whole range of diseases with which it would normally cope. If HIV is diagnosed late, treatment may be less effective in preventing AIDS.

How is HIV passed on?
HIV is not transmitted via casual contact or kissing. It can only be passed on through exposure to HIV-infected blood, sexual or rectal fluids, or breast milk.

The most common ways are via:
* Sexual intercourse with an infected partner where blood or sexual fluids like semen and vaginal or rectal secretions enter the body through the penis, vagina or anus.
* Sharing infected needles or syringes when injecting drugs.
* From an HIV positive mother to her child during pregnancy, childbirth or breastfeeding. However, there are proven steps mothers can take to reduce the possibility of their unborn child contracting HIV.

Less common ways are via:
* Oral sex - although the risks are much lower than with sexual intercourse, blood or sexual fluids may occasionally enter the body via the mouth, particularly if the uninfected partner has gum problems or mouth ulcers.
* Unscreened and untreated transfusions of blood or blood products. However, in the UK all blood products are screened for HIV and other blood-borne diseases.
* An accident in a medical setting, where a healthcare worker is exposed to the blood of an infected person, usually during surgery or via a needlestick injury.

You cannot get HIV from day-to-day contact such as:
Kissing
Touching
Holding hands
Sharing eating utensils
Toilet seats
Swimming pools



How to prevent HIV
HIV is not transmitted via casual contact or kissing. It can only be passed on through exposure to HIV-infected blood, sexual or rectal fluids, or breast milk.

Safer sex
The best way to protect yourself and your sexual partner from HIV is by consistent and proper use of condoms. Condoms are the only form of contraception that will protect you from HIV and must be used with care if they are to be most effective. It can take only a single episode of unprotected sex (for example not using a condom or a condom splitting) with an infected partner for HIV to be passed on. However, HIV is not always passed on the first time, so it's never too late to start practising safer sex.

If you have been exposed to HIV
Post exposure prophylaxis (PEP) is available in the UK under strict prescribing guidelines to people who might have been exposed to HIV during sex. PEP is a course of anti-HIV medication that needs to be taken daily over the course of a month. For the treatment to be effective it needs to start within 72 hours of exposure. It can cause severe side effects such as diarrhoea, nausea and prolonged headaches. Find out more about PEP, whether you are eligible and how to get it.

Injecting drug use
Using clean needles will prevent the risk of infection through injecting drug use. Find out more about needle exchanges.

Mother to baby transmission
As an HIV positive mother, the risk of passing on HIV to your baby is as low as 1% if you are on anti-retroviral therapy, have a caesarean birth and do not breast feed.


http://manojsaket.blogspot.com


Visit Manoj's Blog for more fun...........


World AIDS Day...Take Action Today!!!


Take Action Today

Around forty million people are living with HIV throughout the world - and that number increases in every region every day. In the UK alone, more than 60,000 people are living with HIV and more than 7,000 more are diagnosed every year. Ignorance and prejudice are fuelling the spread of a preventable disease.

World AIDS Day, 1 December is an opportunity for people worldwide to unite in the fight against HIV and AIDS. This year, it's up to you, me and us to stop the spread of HIV and end prejudice.

This starts by taking action.

The National AIDS Trust (NAT) co-ordinates the UK World AIDS Day campaign. NAT is the UK's leading independent policy and campaigning voice on HIV and AIDS. UNAIDS sets the international theme for World AIDS Day, which this year is Stop AIDS, Keep the Promise.





http://manojsaket.blogspot.com



Visit Manoj's Blog for more fun.......


THINK TWICE BEFORE JUDGING OTHERS

One night there was a woman at the airport who had to wait for several hours before catching her next flight. While she waited she bought a book and a pack of biscuits to spend the time. She looked for a place to sit and waited.

She was deep into her book, when suddenly she realized that there was a young man sitting next to her who was stretching his hand, with no concern whatsoever, and grabbing the pack of cookies lying between them. He started to eat them one by one.

Not wanting to make a fuss about it she decided to ignore him. The woman, slightly bothered, ate the cookies and watched the clock, while the young and shameless thief of biscuits was also finishing them. The woman started to get really angry at this point and thought "If I wasn't such a good and educated person, I would have given this daring man a black eye by now."

Every time she ate a biscuit, he had one too. The dialogue between their eyes continued and when only one biscuit was left, she wondered what was he going to do. Softly and with a nervous smile, the young man grabbed the last biscuit and broke it in two. He offered one half to the woman while he ate the other half.

Briskly she took the biscuit and thought, "What an insolent man! How uneducated! He didn't even thank me!" She had never met anybody so fresh and sighed relieved to hear her flight announced. She grabbed her bags and went towards the boarding gate refusing to look back to where that insolent thief was seated.

After boarding the plane and nicely seated, she looked for her book which was nearly finished by now. While looking into her bag she was totally surprised to find her pack of biscuits nearly intact. "If my biscuits are here", she thought feeling terribly, "those others were his and he tried to share them with me." Too late to apologize to the young man, she realized with pain, that it was her who had been insolent, uneducated and a thief, and not him.

How many times in our lives, had we know with certainty that something happened in a certain way, only to discover later that it wasn't true?

How many times has our lack of trust within us made us judge other people unfairly with our conceited ideas, often far away from reality.

THAT IS WHY WE HAVE TO THINK TWICE BEFORE WE JUDGE OTHERS


http://manojsaket.blogspot.com



Visit Manoj's Blog for more fun............


how guys xpress their love!!!

When a GUY is quiet and is alone,
He's is thinking how good you're, Miss you!!!

When a GUY is lying on his bed,
He is thinking deeply why he loves you.

When a GUY looks at you in your eyes,
He wants to tell you how much he loves you and how important you're.

When a GUY answers "I'm Fine" after a while,
He is not and feels hurts.

When a GUY keep asking you the same question,
He is wondering why you are lying.

When a GUY hugs you while sleeping,
He is wishing that you belong to him forever.

When a GUY calls you everyday,
He Miss's You and wants your attention.

When a GUY wants to see you everyday,
He cares for you and wants to know how are you today.

When a GUY sms's u everyday,
He wants you to know he is fine.

When a GUY says I love you,
He really means it.

When a GUY says that he can't live without you,
He has made up his mind that you are his future wife.

When a GUY says "I Miss You",
He wants to see you immeditely.


http://manojsaket.blogspot.com


Thursday, November 30, 2006

Tuesday, November 28, 2006


Visit Manoj's Blog for more fun......


Where to Make an Effort


Ever heard the story of the giant ship engine that failed? The ship's owner tried one expert after another, but none of them could figure how to fix the engine. Then they brought in an old man who had been fixing ships since he was a youngster. He carried a large bag of tools with him . He inspected the engine very carefully, top to bottom.


Two of the ship's owners were there, watching this man, hoping he would know what to do. After looking things over, the old man reached into his bag and pulled out a small hammer. He gently tapped something.

Instantly, the engine lurched into life. The engine was fixed! A week later, the owners received a bill from the old man for ten thousand dollars.
"What?!" the owners exclaimed. "He hardly did anything!"
So they wrote the old man a note saying, "Please send us an itemized bill."

The man sent a bill that read:
.
.
.
.
.
.
Tapping with a hammer ............ ......... ... $ 2.00
Knowing where to tap ............ ......... ....... $ 9998.00


Effort is important, but knowing where to make an effort in your life makes all the difference.



http://manojsaket.blogspot.com



Visit Manoj's Blog for more fun..........


ATM PIN NUMBER REVERSAL (GOOD TO KNOW)

If you should ever be forced by a robber to withdraw money from an ATM machine, you can notify the police by entering your Pin # in reverse.

For example if your pin number is 1234 then you would put in 4321. The ATM recognizes
that your pin number is backwards from the ATM card you placed in the machine.

The machine will still give you the money you requested, but unknown to the robber, the police will be immediately dispatched to help you.

This information was recently broadcasted on TV and it states that it is seldom used because people don't know it exists.


Please pass this along to everyone possible.


http://manojsaket.blogspot.com



Visit Manoj's Blog for more fun......


Information about Virus


A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.

Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.

The Difference Between a Virus, Worm and Trojan Horse
The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.

A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In more recent worm attacks such as the much-talked-about .Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
Key Terms To Understanding Computer Viruses:

virus
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Trojan Horse
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves

worm
A program or algorithm that replicates itself over a computer network and usually performs malicious actions

blended threat
Blended threats combine the characteristics of viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities .

antivirus program
A utility that searches a hard disk for viruses and removes any that are found.

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Added into the mix, we also have what is called a blended threat. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses
The first steps to protecting your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. You should also install a firewall as well.

A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.


http://manojsaket.blogspot.com



Visit Manoj's Blog for more fun........


Three Things


Three things to be
- pure, just and honest

Three things to govern
- temper, tongue and conduct

Three things to have
- courage, affection and gentleness

Three things to love
- the wise, the virtuous and the innocent

Three things to commend
- thrift, industry and promptness

Three things to despise
- cruelty, arrogance and ingratitude

Three things to attain
- goodness of heart, integrity, and cheerfulness


http://manojsaket.blogspot.com