Thursday, October 4, 2012

Sexting Linked to Promiscuity - Hive Health Media

?Sexting?, that is texting where the subject is sex, goes with risky sexual behavior among teenagers according to a new study, published in the journal Pediatrics. 1 in every 7 teens in LA has used their cell phone to send and receive sexually explicit messages. The study also revealed the link between sexting and sex when unprotected by a condom or under the influence of drugs or alcohol. The study set out with the objective to discover if a link existed and the outcome was a very definite yes.

Sociologists at the University of Southern California asked probing questions of almost 2000 young people of high school age and found the same thing happening there, as with young people in an earlier study among Houston teens. Almost one in three, of the Texan teens, owned up to sexting or emailing photos of themselves naked and that these youngsters were far more likely to be engaging in unprotected sex.

The message to concerned parents is that sexting is something to be talked over with the teens and that perhaps any high-profile publicised celebrity case of sexting is the catalyst that could start these cautionary conversations. When politicians or movie stars are exposed in the media take the opportunity to talk with children about sex and the vital necessity of protection for sexual health. Mobile phone sex may well be an easier way into those important discussions and teachings about sex than the bald..?OK let?s talk about sex?.

It is a regrettable fact that our children are exposed all day long to a barrage of sexual objects and, imagery and content. In the postmodern wired world of our children, sex gets attention and makes sales. The fundamental problem is that sex is thrown at them in very superficial and unrealistic ways. All too often it is experienced without joy and intimacy and almost always without critical thinking. So how does all this affect our kids behavior?

Last years? biannual ?Youth Risk Behavior Survey?, sponsored and published by the Center for Disease Control and Prevention, CDC informs us all that 47% of young people of high school age have had full sex. The trend is downward since the ?91 peak of 54%. By the time teenagers reach 19 70% of Americans are no longer virgins, this is an established statistic from the Guttmacher Institute, a panel of experts in socio-sexual and reproductive matter.

There are two really worrying aspects to the sex lives of our young people. First there are way too many teen pregnancies; 68 in 1000 women in the age range 15 to 19. This is coming down slowly but is still very high in World comparison terms. Secondly there is too much unprotected sex going on. We know this because 15 to 24 year olds are just a quarter of the sexually active population yet they have half of the new cases each year of sexually transmitted diseases, STDs. In total there are almost 19 million new diagnoses of STD each year in America.

Source: ?http://www.unh.edu/ccrc/pdf/

Related posts:

  1. Oral Sex Linked to Increase in Throat Cancer
  2. Obesity, Hypertension, and Diabetes Linked to Autism Risk
  3. High School Grades May Influence Health
  4. Overweight Teens May Have Much Tougher Time Managing Diabetes
  5. Childhood Obesity linked to Colorectal Cancer

Source: http://www.hivehealthmedia.com/sexting-linked-to-promiscuity/

tebow broncos ben roethlisberger downton abbey season 2 2013 dodge dart shameless kwame brown martin luther king day

Wednesday, October 3, 2012

judithcowan6: burnt facilitator: Importance Of Information - Typepad ...

Computers-and-Technology Articles from EzineArticles.com

Importance Of Information Technology Training Courses

Those people looking to begin a career in information technology (IT) should take part in information technology training courses; this training can also be beneficial to those who have already begun a career in IT. IT training helps trainees?

Internet-and-Businesses-Online:Link-Popularity Articles from EzineArticles.com

Automatic Backlink Software: How Does Social Media Link Building Work?

Increasingly more website owners and Internet marketers are using social media to get quality backlinks. There has been a lot of debate regarding traditional link building methods versus social media. The rules of SEO have changed a lot over the past few months as Google emphasizes organic link building.

Internet-and-Businesses-Online:Web-Development Articles from EzineArticles.com

Businesses Taking Customized Software Development Services

Considering the specific needs of a business, software development companies are offering suitable custom software solutions that can meet their specific requirements within budget. The custom solutions are helping businesses to improve their internal processes that can leverage their potential in the niche market.

Source: http://kevinssoftware.com/wordpress/?p=326

big ten championship game ultimate fighter 14 ultimate fighter 14 2011 bowl projections ndamukong suh ndamukong suh aptera

Source: http://burnt-facilitator.blogspot.com/2012/09/importance-of-information-technology.html

fast times at ridgemont high fast times at ridgemont high soylent green phil davis george st pierre

Source: http://mkatva.posterous.com/burnt-facilitator-importance-of-information-t

santorum wins iowa archer ibooks 2 ifl indoor football league newt gingrich wife callista

Source: http://logaker.posterous.com/burnt-facilitator-importance-of-information-t

db cooper fafsa branson missouri davy jones dead monkees last train to clarksville tim tebow taylor swift

Source: http://judithcowan6.blogspot.com/2012/09/burnt-facilitator-importance-of.html

seahawks new uniforms 2012 tornadoes in dallas anchorman 2 kentucky basketball oaksterdam the fray national anthem dallas tornado

Source: http://ward5401.typepad.com/blog/2012/09/judithcowan6-burnt-facilitator-importance-of-information.html

marian hossa philip humber red sox yankees white sox chuck colson ufc 145 results

Source: http://inception-stepchildren.blogspot.com/2012/09/judithcowan6-burnt-facilitator.html

jetblue jetblue michelle malkin october baby sugarland 16 and pregnant ludwig mies van der rohe

Source: http://edafogic.posterous.com/judithcowan6-burnt-facilitator-importance-of

x factor results the hobbit movie trailer xfactor frankincense cloudy with a chance of meatballs the hobbit movie hanukkah

Source: http://rovsip.posterous.com/judithcowan6-burnt-facilitator-importance-of

derrick rose injury st louis news utah jazz lawrence of arabia denver nuggets orioles correspondents dinner

Chinese company sues Obama over wind farm shutdown

Follow The Daily Ticker on Facebook!

On Friday, President Obama took the highly unusual step of blocking a Chinese company from building wind farms in Oregon.

The Chinese company, Ralls, is furious and has threatened to sue the president.

According to a statement issued by the Treasury Department, President Obama made the decision because of national security concerns: The proposed sites for the four wind farms Ralls wants to build are located in or near restricted airspace used by the Navy to test weapons.

In the current political environment, with Obama being attacked for being too weak on China, the decision smacks of politics. It also feels like tit-for-tat: China's government has prevented many American companies from aggressively pursuing projects in China, and complaints about China's brazen theft of U.S. intellectual property are widespread.

With China's economy growing ever larger and richer, and with the U.S. running a massive trade deficit, clashes like these are likely to become more common. Back in 2005, a bid by Chinese oil company CNOOC for American oil company Unocal triggered a wave of "China's taking over!" fears that were reminiscent of similar scares about Japan back in the 1980s. In the face of an intense political backlash, CNOOC withdrew its bid, but the broader issue isn't going to go away.

China is the beneficiary of a huge trade surplus with the U.S., which means that it is accruing an ever-larger pile of dollars that it needs to put to work. At the same time, China is desperate to secure the raw materials and resources it needs to continue its rapid economic growth. The combination--cash to burn and the need for resources--will likely prompt more Chinese companies to try to acquire U.S. assets. Given the clear tensions between the two superpowers, these moves will always become political.

More from The Daily Ticker

Facebook Launches "Gifts": Are You Comfortable Sharing Your Credit Card?

Corporate America Growing Wary About Fiscal Cliff

For BlackBerry Maker RIM, Recovery Still Doubtful

Why Men Are Failing in This New Economy

Source: http://finance.yahoo.com/blogs/daily-ticker/china-threatens-sue-obama-over-wind-farm-shutdown-151035652.html

dallas tornado ncaa basketball oikos kentucky wildcats oakland school shooting nike nfl jerseys katie couric

Tuesday, October 2, 2012

Facebook Acqhires Founders Of Carsabi Who Will Sell Off Their Car Price Comparison Site

Carsabi Founders Join Facebook.23 PM copy 2 Done copyFacebook's has just closed a deal to hire Dwight Crow and Christopher Berner, the two founders and only teammates of Y Combinator used car price comparison site Carsabi. The founders are now looking to sell the site so it can live on even though Facebook won't be needing it. Facebook tells me there wasn't something specific that attracted it to the co-founders other than that "they're awesome?entrepreneurs". It?won't say what team the founders will be joining.?However, we see fitting in behind the wheel of Facebook Gifts or Events. Here's why.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/HFsxQQFWw_M/

Eddie Murphy died Suzanne Barr Clint Eastwood speech Maria Montessori clint eastwood Julian Castro Chris Lighty

Why your money may be at risk after bank cyberattacks

7 hrs.

For the past two weeks, an unknown attacker or group of attackers has disrupted access to the websites of five major American banks: Bank of America, JPMorgan Chase, Wells Fargo, U.S. Bank and PNC Bank.

Many customers have?had trouble reaching the sites?to check their account balances or move money around, thanks to what appears to be a series of coordinated attacks.

It's not clear exactly who's behind the disruptions, despite the claims of a previously unknown Islamist group, or even what sort of methods they're using, but here's what we do know.

What's really happening?
Someone's flooding the Web servers of the banks' websites with tons of useless requests for information that can't be fulfilled, overwhelming the servers. Experts call this a?distributed denial-of-service (DDoS) attack.

As a tactic, it's crude but temporarily effective; it doesn't crash the servers, get into databases or cause lasting damage, but it does make the sites hard to reach by clogging the pipes.

Graham Cluley, senior technology consultant at the British anti-virus company Sophos, once likened a DDoS attack to "15 fat men trying to get through a revolving door at the same time."

Hacktivist groups such as Anonymous often use?DDoS as a form of protest, effectively blockading the sites of organizations without damaging them. Yet well-defended sites, such as the banks presumably have, would normally be able to blunt a DDoS attack.

[Hey Stupid: Why Internet Hacking Is Your Fault]

Are there any risks to customer accounts or personal information?
There shouldn't be any, if these are indeed just DDoS attacks.

"There's absolutely no risk to?customer information," said Dmitri Alperovitch, chief technology officer of the security firm CrowdStrike. "They're just not able to get to the site for a few hours."

Cluley agreed.

"I think the only impact of the DDoS attacks on customers is that they may not be able to access their bank's website," Cluley said. "It shouldn't pose any risk to their accounts other than problems accessing them online."

Steve Santorelli, a researcher at Lake Mary, Fla.-based nonprofit security firm Team Cymru, isn't so sanguine about the bank attacks.

"There are three concepts to security: availability, confidentiality and integrity," Santorelli said. "Any event that compromises even just one of them can have complex repercussions and also, of course, takes monitoring and response resources away from any synchronized unauthorized logins to accounts."

Sure it's not just a series of server failures?
One bank's site going down?could be just a technical issue, but five major banks having similar problems is beyond coincidence.

Futhermore, online postings by the group claiming responsibility have told the world ahead of time which bank's going to be hit on which day, and they've mostly been accurate.

CrowdStrike's Alperovitch said there's no question that these are deliberate assaults.

"We're tracking this one," he said. "It's definitely a denial-of-service attack."

Could cybercriminals out for financial gain be behind the attacks?
It might just be possible that the service disruptions are a smokescreen to cover for raids on customer accounts, though experts disagree on how likely that is.

In the same way that the bank robbers in the 1969 crime caper "The Italian Job" created a traffic jam (by hacking into a computer that controlled traffic lights) to paralyze the police response, the DDoS attacks could be meant to divert digital-security personnel's attention away from protecting information.

The FBI released an advisory in November 2011?warning of such scenarios, and even cited a form of banking Trojan that was designed for such attacks.

"Nowadays it's commonplace to have criminals combine banking Trojan attacks with DDoS attacks," said Mikko Hypponen, chief security officer of Helsinki, Finland anti-virus firm F-Secure. "When they score a big transfer from a company's or an individual's accounts, they launch a DDoS against the online bank.

"This accomplishes two things: 1) the victim can't log in to the bank and see that he's been robbed 2) the bank staff is busy fighting the DDoS and might miss the illegal transfers (although in most cases it would be different people in the bank's organization in charge of those things)."

Robert Graham, chief executive officer of Errata Security in Atlanta, admitted that was a possibility, "but then pretty much any speculation is possible."

"There is a question of the sort of DDoS attacks [taking place]," Graham said. "Are they simply website requests, taking down the websites? Or are they specific queries, trying to flood backend transaction servers in an attempt to hide some other activity? We need more information to figure that out."

Chet Wisniewski of Sophos' Vancouver, B.C., office, had doubts that regular cybercriminals were involved, doubts that Alperovitch echoed.

"Honestly, I am not sure it would make sense for this sort of crime," Wisniewski said. "If you were to use a DDoS as a diversion, it would be used for you to get a foothold for a targeted attack, not traditional banking fraud/Trojans."

"Banking Trojans?work so well that they don't need a cover," Alperovitch said.

Why aren't the banks saying more?
Despite all of the publicity, none of the banks have said much beyond apologize for the inconvenience to customers.

"What's the advantage of admitting you were hit by a DDoS attack?" Graham said. "Banks are shy of litigation ? they don't admit anything."

"There is still a stigma, a perception, that customers do not like their accounts being handled by a bank that is not 'safe,'" Santorelli said. "Banks, like every other industry that has embraced the internet, do not like bad publicity. ... It's not a?data breach, so it is not covered by the 'new data breach notification' legislation in the U.S."

Wisniewski pointed out that the banks might be legally barred from releasing details.

"There is likely an ongoing investigation by the FBI prohibiting them from discussing any details publicly," Wisniewski said. "I don't think there is any shame in [admitting being under attack], but who knows ? maybe they have something to hide."

Who's behind this?
Even with criminals ruled out, it's still tough at this stage to know who's really behind the disruptions.

A previously unknown Islamist group calling itself the "Qassam Cyberbrigades" or "Cyber Fighters of Izz al-din al-Qassam" has?posted messages in English and Arabic?on online forums claiming responsibility for the attacks, and accurately predicted which banks were going to be hit.?

The "Cyberbrigades," whose name refers to the military wing of the Palestinian Islamist party Hamas, claim the attacks are retaliation for the offensive YouTube clip "Innocence of Muslims." They vow to continue the attacks until the video is entirely removed from YouTube.

But anonymous national-security experts told NBC News last week that it's unlikely that amateur hackers could have mounted such massive DDoS attacks against well-protected websites of American banks. Instead, they said, there's a more likely culprit: the government of Iran.

Sen. Joe Lieberman, I-Conn., repeated that theory last week, telling a C-SPAN interviewer that Iran was probably behind the attacks.

Alperovitch said either theory was possible, though he doubted it was a response to "Innocence of Muslims."

"We believe it's either a hacktivist group, or what Senator Lieberman has declared," he said. "It would take months of planning to organize this."

Cluley, on the other hand, thought it best to gather evidence first.

"Any joker can post messages on the Internet claiming to be responsible ? but that's very different from finding a smoking gun," Cluley said. "We should all be careful about jumping to conclusions or pointing fingers in particular directions until convincing evidence is presented."

Wisniewski didn't think the scale of attacks necessarily pointed at a nation-state.

"I have not seen nor heard of any serious evidence that Iran is behind these attacks," he said. "Any criminal with a wish to cause mischief certainly could. DDoS may not trivial at this scale, but it is relatively cheap to rent?very large numbers of bots."

The Jester, a well-known "patriotic hacker," put up a blog posting earlier this week?detailing an Internet Relay Chat conversation?he had with a botnet renter. The Jester pretended to be an Islamist friend of the Qassam Cyberbrigades, and was given a price of $200 for a 1,000-hour DDoS attack.?

Independent security expert Dancho Danchev does think the attack may have come from Iran ? but not from the Iranian government.

On his blog Friday, Danchev?showed what he said was evidence?that a young Iranian woman began a grassroots hacktivist campaign by posting a link from her Facebook page to a download. The download links have since spread to websites and forums frequented by Islamists.

The download contains a simple "htm" file, which displays page housed on the user's own computer in a Web browser. The page contains a message in Arabic and English, a list of targets and a simple button. Pushing the button launches an attack from the user's computer against the bank websites.

How are they doing it?
Danchev said the tool being used was a version of a free server-load-testing application called the?Low Orbit Ion Cannon, which the hacktivist group Anonymous has used in the past.

But knocking a major bank's website offline would take many times the firepower that any hacktivist group would normally possess.

"The level of sophistication is moderate to low," Alperovitch said. "What's interesting is the volume."

Threatpost, the consumer-oriented blog of Russian security firm Kaspersky Lab, said some of the traffic hitting the banks' servers?reached 100 gigabits per second, as opposed to the regular DDoS attack volume of 5 to 10 gigabits per second. It did not cite its source.

"Someone clearly had motivation to put this together," Alperovitch told SecurityNewsDaily. "It's unlikely that a kid would make that much effort. The only thing we know at this point is that it's organized and whoever's behind it has spent a lot of effort."

Graham wasn't so certain.

"Any joker even without the right tools can disrupt a heavily protected site," he said.

How can you protect yourself?
Again, if this is really just a DDoS attack, the banks' customers are not in much danger of losing money or personal information.

But there are still basic precautions that any online banking user should take, regardless of the present danger.

"Use, and regularly change,?strong passwords?for your accounts," Santorelli said. "Keep your machine patched and theanti-virus?and firewall automatically updated.

"If you don't need?Java?and Adobe software, uninstall it, although many banks require Java," he added. "Of course, use an up-to-date browser."

All those tips will protect your personal information and screen out malware, but there's still the chance a smart banking Trojan could get in.

"If you are really worried," Santorelli said, "use a?dedicated clean machine?to access your accounts and never use it for anything else. ... if customers prevent anyone stealing their banking credentials in the first place, they have little to fear other than the inconvenience of not being able to get to their online accounts."

Copyright 2012?SecurityNewsDaily, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Source: http://www.nbcnews.com/technology/technolog/why-your-money-may-be-risk-after-bank-cyberattacks-6200003

encyclopedia brittanica nfl free agency jonbenet ramsey jason campbell doobie brothers jennie garth peter facinelli marques colston

Monday, October 1, 2012

File:Lieu historique national du Canada du Fort-Lennox 07.jpg

Our servers are currently experiencing a technical problem. This is probably temporary and should be fixed soon. Please try again in a few minutes.

You may be able to get further information in the #wikipedia channel on the Freenode IRC network.

The Wikimedia Foundation is a non-profit organisation which hosts some of the most popular sites on the Internet, including Wikipedia. It has a constant need to purchase new hardware. If you would like to help, please donate.


If you report this error to the Wikimedia System Administrators, please include the details below.

Request: GET http://commons.wikimedia.org/w/index.php?title=File:Lieu_historique_national_du_Canada_du_Fort-Lennox_07.jpg&diff=79690043&oldid=79534108, from 108.178.10.50 via cp1006.eqiad.wmnet (squid/2.7.STABLE9) to ()
Error: ERR_ACCESS_DENIED, errno [No Error] at Sun, 30 Sep 2012 13:16:37 GMT

Source: http://commons.wikimedia.org/w/index.php?title=File:Lieu_historique_national_du_Canada_du_Fort-Lennox_07.jpg&diff=79690043&oldid=79534108

naacp glen campbell jerusalem artichoke bud shootout aretha franklin stevie wonder new orleans weather

Amazing Hidden Beach on Marietas Islands in Puerto Vallarta, Mexico

It's not everyday that you get to visit the beach, much less a hidden one. Well, you're in luck, the images above show a hidden beach on Marietas Islands in Puerto Vallarta, Mexico. The Marieta Islands "are archipelagos that were formed as a result of volcanic activity." Continue reading for a video and more information.

The marine environment of hidden beach Marieta Island, Puerta Vallarta has developed over several years, sans any disturbance from humans or outside nature. As a result, the marine life here is intriguing and holds a huge potential for people who love just this kind of sport. Marieta Islands are one of the best sports for snorkeling and scuba diving owing to the virgin nature of the place, along with its diversity.

The water along the hidden beach Marieta Island, Puerto Vallarta is a crystal clear blue mass of pure bliss. Of the marine wildlife available to view in the place, Humpback whale, sea turtles and dolphins are just a few of the most magnificent examples. Travelers can also enjoy a powerboat trip to the hidden beach, Marieta Island, Puerto Vallarta taking in the scenery along the way.

[Source 1 | 2]

Source: http://www.techeblog.com/index.php/tech-gadget/amazing-hidden-beach-on-marietas-islands-in-puerto-vallarta-mexico

the third man 2012 nfl draft order mohamed sanu chris polk chicago bulls st louis blues rueben randle