Tips on Mobile Maintenance

Looking after your mobile helps to ensure it has a long and productive life.  There are 8 easy maintenance tips to help you get the best out of your mobile phone. All of the points below should also apply to your battery, charger and any other accessories.

KEEP YOUR MOBILE:

   1. Charged: Ensure your battery is fully charged, and then completely run it down before recharging. Recharging too early causes your battery to run out of power more quickly. 
   2. Secure: For security reasons, enable the PIN on your SIM Card and Phone-lock on your phone to avoid unauthorized used. These security checks will also be activated when the phone is power cycled. You can check with your carrier or the phone manual for the features and also for information on blocking your SIM card and phone IMEI number if the phone is stolen. For more information please see the Security Tips located on the AMTA Lost and Stolen website.
   3. Protected: Make sure you use a keypad lock to lock your phone. Unplanned calls can cost a fortune and even though your phone may be in a safe place, such as in a bag, your phone will still get knocked around to a surprising degree. Rough treatment can damage electronic circuit boards so avoid dropping or unnecessarily shaking your phone.
   4. Battery: Be safe with your batteries. Use only genuine batteries from your phone manufacturer and only buy from authorized dealers. Going for the cheap option of a counterfeit battery can be dangerous.
   5.  Clean: Don't use harsh detergents, cleaning solvents or harsh chemicals to clean your phone. Wipe only with a soft cloth.
   6. Covered: a protective cover will help repel dust and dirt, and prevent scratches. Make sure the cover you choose is of good quality. Low quality covers with no air pockets can damage you phone by creating humidity inside the cover.
   7. Storing your phone: Always store your phone in a dry place. Avoid rain, high humidity and liquids. All of these may contain minerals that could corrode the electronic circuits.
   8. At the right temperature: To ensure a long life, keep your phone in a stable temperature. Avoid exposing your phone to liquid and/or exposing your phone to extreme temperature change from hot to cold and vice versa. This might create condensation and damage the phone.

Mobile phone viruses, simple measures to protect yourself

The Australian Mobile Telecommunications Association (AMTA) has developed consumer tips to assist users to protect themselves against the risk of mobile phone viruses.
This guide explains what viruses are, how they spread, and what can be done about them.

 What’s a mobile phone virus?
A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.
A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.
Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.
Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves.
What can I do to protect my phone?

The following tips can help prevent problems with viruses on your phone

1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.

2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software. Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.

3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source.

4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.

5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.

How to display the hidden secret of iPhone mobile phones?

Today tip will help you to enjoy some secret codes of iPhone mobiles. You can try these tricks to all latest iPhone      mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

 



Follow the list of latest iPhone codes list:

 

Code                                        Action  
*#61# and tap Call          To verify the number of unanswered calls
*#62# and tap Call          Use to verify the number for call forwarding
*#06#                                 To display the IMEI Number of the mobile
*777# and tap Call          To display the account balance information for prepaid iPhone
*225# and tap Call          To display the account balance information for Postpaid iPhone
*#67# and tap Call          To display the number for call forwarding when the iPhone is busy
*3001#12345#*               To display many of the inner settings of your iPhone
*#21#                                 To verify the call forwarding is enabled or disabled
*646# and tap Call          To display the Post-paid minute balance
*#33# and tap Call          To Check for call control bars

Global System for Mobile Communications (GSM)

GSM network is designed by using digital wireless technology. It offers compatible wireless services to all mobile users in all over the world. The basic requirements for GSM are following:

    *   Services
    *Quality of services and security
    * Radio frequency utilization
    * Network

Services: The services, which are provided by the system, should be potable to all Mobile Stations or Mobile Phones so that it can b used in all over the world. 

Quality of services and security: The quality of both voice and data services of GSM should be good. The voice data is encoded in digital form by using a modulation technique i.e.Gussian Minimum Shift Keying (GMSK).The security features should be provided by the system to protect the network against unauthorized users.
Radio frequency utilization: The system should use the available band of frequencies (For uplink: 890-915MHz & For downlink: 935-960MHz) efficiently.

Network: Network designers manage the identification and numbering plans while switching and mobility management based upon signaling system i.e. Signaling System Number 7(SS7).
GSM Architecture 

The main component groups of GSM architecture are:
    *Mobile Stations (MSs)
    *Base Station System (BSS)
    *Network and Switching Subsystem (NSS)
 Mobile Stations (MSs):
The Mobile Station (MS) consist of two operational parts.
   1. Mobile Equipment (ME)
   2. Subscriber Identity Module (SIM)
Mobile Equipment (ME): This is the hard ware used by the subscriber to access the network and it has a unique identity number known as International Mobile Equipment Identity (IMEI).
Subscriber Identity Module (SIM): This is a type of electronic card that is plugs into ME and contains detailed information about the mobile subscriber.
Base Station System (BSS):
BSS is central equipment, which is located at the cell site. It provides the link between MS and NSS. The BSS consists of two operational parts.
Base Transceiver Station (BTS): BTS consists of transmitting and receiving antennas and signaling equipment that provide air interface for a cell to route the call. BTS communicates with the MS.A single BTS can support one or more cells.
Base Station Controller (BSC): All switching functions, which are performed in MSC, are controlled by BSC. It also supports handoff strategies and allocate or release temporary channels for those users whose needed handoff. Several BTSs can be controlled by a single BSC and one MSC can serve many BSCs
Network Switching Subsystem (NSS)
It is the main switching center of GSM network. NSS includes the following:
Mobile Switching Center (MSC): It is the basic unit of NSS, which supports call-switching or routing functions. Its purpose is the same as that of telephone exchange but due to advanced wireless technology, its working is much better than that of exchange. Each MSC provides coverage to a defined geographic area only.    
Home Location Register (HLR): For subscriber its a reference data base. Current location of MS, identification numbers and various addresses are maintained in it.
Visitor Location Register (VLR): It’s also a type of database. When an MS moves from home location to a visited location then its location is registered as a visitor in the VLR of visited system and this information is also updated in HLR of MS, by the VLR.
Equipment Identity Register (EIR): Its again a type of database, which contains information about MS equipment and check and identify its international validity of hardware and software to work properly.
Authentication center (AUC): Its a processing center and is normally worked together with HLR.Like HLR its also require to continuously access or update subscribers data. Its main purpose is to provide data security features to authenticate the subscriber.

How to display the top secret of Sony Ericsson mobile phones?

Today tip is about the secret codes of Sony Ericsson mobile phones. These codes will work on most of the latest Sony Ericsson mobile sets.  You can display the hidden information of mobile sets and then troubleshoot the routine problems using these codes.

Sony Ericsson Useful Secret Codes

 

Code                                        Action

0#                                  To display the last dial number
*#06#                             To display the IMEI Number of the mobile
-> * <- <- * <- *                Use to display the secret menu of Sony mobile
<**<                               Use to display the information about mobile network
< 0 0 0 0 >                      Use to reset Sony Ericsson mobile default language
>*<<*<*                          Use to display the mobile software version
<0000>                           Use to reset Sony Ericsson mobile default theme
#                                    To display the SIM Number of the mobile
**04*0000*0000*0000#     You can access you mobile settings without SIM card
*#0000#                          Use to reset Sony Ericsson mobile English menu
904060 + >                     Use to reset mobile phone settings
904093 + menu               Use to display the CDMA Mode                     
status. > * > (>);                        To display the text contained in the phone

How to display the hidden settings of LG handsets?

Today tip will help you to play with your LG mobile phones using secrets codes. These secret codes will work on most of the LG mobile handsets. You can display the hidden information of LG handsets and troubleshoot the routine problems with the help of these codes.

Follow the list of latest LG codes list:

 



Code                                                        Action

2945#*#                                                To access the test mode of the set
2945*#01*#                                          Use to display the secret menu of LG mobile set
*8375#                                                   Use to display the mobile software version
*#06#                                                     To display the IMEI Number of the mobile
2945#*70001#                                     Use to manage Simlock menu for LG (LG 7010, 7020)
277634#*#                                            To set the defaut settings of mobile
1945#*5101#                                       Use to manage Simlock menu for LG (LG B1200)
2945#*5101#                                       Use to manage Simlock menu for (LG 5200, 510W )
2947#*                                                   Use to manage Simlock menu for (LG 500, 600)
47328545454#                                    To set the defaut settings of mobile
*#07#                                                     To display the SW and IMEI Number
277634#*#                                            To remove the security codes of LG sets
* 6861 #                                                 To recount checksum
##2342                                                  Apply to resets the set advanced settings
##786                                                    Used to reset the mobile memory and life timer
##889                                                    To Enable the TTY
#PWR 668                                            To perform the Factory test

How to display the hidden settings of Samsung mobile phones?

Today we will discuss about the some secret codes of Samsung mobiles. These codes may be not applied to all old models of Samsung mobile, but you can try to all latest Samsung mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest Samsung codes list:
 

Code                                        Action
*#9999#                                Use to display the mobile software version
#*3849#                                Use to reboot the Samsung handsets
*#06#                                   To display the IMEI Number of the mobile
#*2558#                                To on/off the mobile time
#*7337#                                Use to unlock the latest Samsung set
#*4760#                                Use to activate and deactivate the GSM features
*#9998*246#                         To verify the memory and battery information
*#7465625#                           To verify the Lock status of mobile 
*#0001#                                To display the Serial Number of the mobile
*2767*637#                            Use to unlock the mobile code
*#8999*636#                          To display the storage capacity of the mobile
#*2562#                                 Use to reboot the Samsung handsets
*#8999*667#                           Use to run the mobile in Debug mode
*2767*226372#                       To fine-tune the camera settings
*#8999*778#                           Use to display the information about mobile SIM card
*2767*637#                             Use to unlock the mobile code
*7465625*28638#                    Use to make active the Network Lock
#*#8377466#                          To display the hardware version
*7465625*746*Code#               Use to make active the SIM card lock
*#pw+15853649247w#             Use to unlock the mobile code without SIM card
#*3888#                                 To verify the Bluetooth information
*#9998*627837793#                Uses to get extra parameter for unlock mobile settings
#7465625*28638#                   Use to unlock the Network Lock
#*7983# Voltage                     Use to regulate Frequency or Voltage
#7465625*746*Code#              Use to unlock the SIM card lock
#*2834#                                 Use to reset the handsfree options
#*5376#                                 To delete all SMS in one command
*#4777*8665#                         Use to explore the GPSR tool list
#*2474#                                 To verify the charging duration
*2767*688#                            Use to readjust the mobile TV options

How to display the hidden settings of Nokia mobiles?

Today tip is about the secret codes of nokia mobile phones and will work on most of the latest nokia mobile sets.  You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest nokia codes list:

Code                                                     Action
 *#7780#                               To restore the factory settings of mobile set 

*#3283#                               To verify the set Manufacturing date 
*#746025625#                   To stop the sim clock
*#67705646#                      Use to delete the operator logo
*#73#                                    Use to reset game scores and phone timers
*#0000#                               Use to display the mobile software version
*#06#                                    To display the IMEI Number of the mobile
*#92702689#                      To display the mobile warranty related settings (Serial no, Made,
                                             Purchasing  date, Repaired date, Life time). 
 *#7760#                                To display the Production serial number
*#bta0#                                 Use to display Bluetooth MAC address
*#9999#                                Use to display the mobile software version

*#147#                                 If you are using Vodafone then this code will help you show the last  call  detail
*#2640#                               To display the mobile security code
*#7328748263373738#   Apply to resets the set default security code
*#43#                                    To verify the call waiting status
*#2820#                                To verify the Bluetooth information
*#7370#                                To format the mobile phone memory
*#delset#                              To delete the GPRS AND EMAIL settings
#pw+1234567890+1#       To display the lock status of mobile set
#pw+1234567890+4#       To display the lock status of your SIM

How to quickly repair your Mobile Phone dropped in water?

How to quickly repair your Mobile Phone dropped in water?
Many of you get your mobile phone wet by one way or another. You worry as you mistakenly drop your mobile phone in water. It can also get wet if you are out in a heavy rain.  However, there is no need to panic. It is possible to save your wet mobile phone by quickly repairing it. In order to save your mobile phone from water damage, you can consider these easy and simple solutions:

Act rapidly :
The first thing you have to do in order to save your wet mobile phone is to act rapidly. Quickly remove all the detachable parts as well as covers possible such as the back cover, battery, the SIM card, memory card etc. Next, take a piece of cloth or a tissue paper to wipe the excess water you are able to notice within the mobile phone. Make sure that you dry it completely. If you don' t do this, the water inside the mobile phone will begin to evaporate and gather in places which will be difficult to reach.
This will save your wet mobile phone and it will start working if it was under water for just a little while.

Using a hairdryer :
Take a hairdryer and begin drying the mobile phone while giving more consideration to the place where the battery is located. The battery housing usually consists of tiny holes to let in air (so giving more space for water) inside the mobile phone.
Make sure that you are not holding the hairdryer very near to the mobile phone. Keeping it too close to the mobile phone may harm the electrical mechanism of the mobile phone. Keep on drying the mobile phone from a safe distance for about twenty to thirty minutes.
If solution number 1 and solution number 2 don't work, try solution number 3.
Drying for a long time: 
Take off the covers as well as battery from the mobile phone. Put the phone in a dry as well as warm place to let the water inside the phone evaporate gradually from the little holes in the mobile phone.

The NEW iPhone 5 - Coming July 2011

Lots of speculation is going around on the new iPhone 5... in HD!!

Verizon Wireless is currently testing a CDMA version of the iPhone 4 and 5 and Verizon confirms they are making network changes to bring the iphone to their network. The new iPhone 5 is going to be loaded with awesome new features like video chat on 3g and 4g (no longer restricted to WiFi only), face recognition and extreme downloading. (List of possible features below). Just when you think there is nothing else to come up with, more and more and more technology comes out. And it is on the rise, and not just at Apple, Inc!This iPhone 5 will have dual core processors and higher and powerful graphic chips that can deliver higher video resolutions and better "still" images when taking pictures, AND it will make multi-tasking a breeze.There are a few networks working on building a 4G network. T-mobile would be a likely carrier since they are GSM already. Sprint has a 4G network already... AT&T and Verizon Wireless are in the beginning stages. There are talks of Verizon Wireless getting iPhone sometime in 2010 but it looks like they will get it for sure in 2011 when the new iPhone 5 comes out.Whether or not it will be 4G will be up to them!... can they build in time? They will definitely have the 3G version of iPhone, but with the new iPhone 5 (4g speeds) coming out, will they compete?! Regardless, there is much anticipation on how many people will leave AT&T for Verizon Wireless because of AT&T's lagging on app restrictions like Slingplayer and Google Voice and Skype (on 4g network, not Wi-Fi).AT&T's restrictions have caused the percentage of people that are JailBreaking their iPhones to rise since Jail Breaking usually comes with Cydia which is the app store for jail broken phones. Most of the applications, ringtones, and even iphone themes!...are free with Cydia. Winterboard is part of the download, and it very easily add's the changes to your phone so you dont have to figure how to do it on your own...it is VERY automated. The Palm Pre on Sprint and HTC EVO (Sprint now offering a 4G network) has made an attempt at being competitive with iPhone and Blackberry...and it seems they are making head way, although with the iPhone 4 released and the iPhone 5 on the way, they are sure to lose. Oh ya, the Blackberry Torch? = Nice try... but that browser is NOT full HTML.
iPhone 5 looks promising in terms of being sleek, packed with new hardware and finally less restrictions. Very exciting.
A few features of iPhone 5:
Thinner! With shiny glass back piece - 9.3 mm thick.
Face Recognition Security
Face Time (Video Chat) access on 3G AND 4G (available currently but only on 3G)
Custom SMS tones
Custom E-mail alerts with ability to assign different tones to each email address
A new, sleeker body design.
OLED screen.
Scratch proof and shatter proof screenWireless sync with iTunes
32G (basic) and 64G of memory. You're sure to never run out.
Extended battery life = 14 hours talk time on 3G and 7 hours on 4G. Standby 600 hours.
Hi Definition audio.
Messaging indicator light.
True GPS built in.

Online Forex trading: A rapid money maker

 Online Forex trading: A rapid money maker

Making trade using currency so as to get profit is nothing but a game which deals with sheer guess work or assumption. One can only guess whether a particular currency will increase in value or not. It is like trading a stock: when you guess that a particular currency will increase in value in future you could buy it at its current low price by selling another currency which may reduce in value. For instance if you have $50 US dollars and if you feel that its value may decrease in the future, as a Fox trader, you can exchange it for Euro which may increase in value. Suppose the Euro increases in value as guessed you may earn money otherwise it would be a loss for you.
At present most of the people are marching towards forex trading as it gives ample scope to earn money in an easy manner through online method. In contrast to other trade markets online forex systems gives a better scope for earning money in different ways by selecting currencies of one’s own assumption. If one wants to trade in the online forex market it is not necessary to find out the pros and cons of trade market. All he has to do is to sign up with a mediator and open a demo account. No other market but forex trade market alone paves way to earn money swiftly.
Once the skills are mastered you can become an expert just by being at home. The trend of the market is easily known from online and huge amount is acquired with minimum effort. Due to the speedy development of online forex trading one can succeed to a greater extent than trade market. Based on the movement of currency the profit increases.
When trading is done on a large scale huge amount of money need not be invested. On line Forex trading is highly advantageous than other trade markets because one can earn a lot of money from this only. But proper training and exposure is highly needed. Apart from that the basic amenity for a person to do online forex trading is a computer with online facility and money to purchase currency. If a person acquires all these amenities and skills he may reach the highest peak in online forex trade.

Review on outlook 2007

The new Outlook 2007 from Microsoft is a strong update of the previous Outlook 2003. It has some newly added features that it makes our work an easy thing to do. The Microsoft Outlook 2007 is not a revolutionary product that completely redefines the concept of e-mail work. The ease of use of the client has been improved significantly though.
Features:
The Microsoft Outlook 2007 has improved features like the new Ribbon toolbar which is an excellent add on to the product and it just makes the program a pleasure to use. The menu items are very accessible and easy to use.
Microsoft Outlook 2007 has been a good surprise to all. Many features that have really impressed all, like the quality of the searches and the speed of the client. The security feature of Microsoft Outlook 2007 has been the most important issue to make a note of.
Usability:
Many commands from the previous version of Outlook are retained which makes it more user friendly. There has been built the support for other office clients. The e-mail messages can now be opened even via word documents.
If you have been used with the simplicity of dragging and dropping, marking the important files with a specific color and so on, you will find Microsoft Outlook 2007 a fresh breath of air, because we have been amazed by the ease of using the client.
Limitations:
Outlook 2007 utilizes word 2007 HTML for depiction that makes message format unbalanced.
Recommendations:
It is almost impossible to return to the previous version of Microsoft Outlook 2003 once you have tried the new Microsoft outlook 2007. The Outlook 2007 is a great thing for both experienced users and users that have used Outlook a short period of time because they can benefit from the fact that the client is very easy to navigate through and it has a very user friendly interface. The upgraded version has granted our wishes. Everything that we have wished for from the previous versions it is now present in the outlook 2007.

REVIEW ON CHINABUYE.COM

Searching for a trusted drop shipping provider, who can deliver quality electronic products? Here is the world’s best and a professional drop shipping provider who can deliver your bulk orders with at most care “chinabuye.com”. We are always in search for a good online network that drop ships electronic products with at most care and chinabuye.com can be your best choice. We all know people find it handy to purchase electronic products online because they can choose from wide range of models and designs. Electronic products like mobile, computer accessories, pen drives, players and all latest electronic gadgets in the market are available for drop shipping and they reach you without any damages.

At chinabuye.com, the buyers can compare their products and choose the design which they like. Chinabuye gives importance to their buyers and that is why many people call them as a “Professional drop shipping provider”. You can choose the products and add them to cart and within few days of time, you will be having the same product in your hand what you saw in their website. This is not a case in many other electronic product selling networks. They display you a good product and when it reaches your hand you will be having some other product. But chinabuye gives you what you see in their website without any damages at a very cheap rate.

If you are an electronic product retailer, then you can get bulk electronic products drop shipped in a safest condition at your door steps from chinabuye.com. People should be aware that drop ship wholesale companies are increasing year by year and you should select the one that gives you great service. If service, quality and affordable price are in your mind then you can choose chinabuye.com as the best drop shipping company. Many drop shipping companies’ gives you promise “what they can do?” but chinabuye only says “what they have done in the past?”. So people can trust their service and within few years from now chinabuye will emerge as worlds no 1 drop shipping company.

A good drop shipping company should complete their order in a very fast time and this is the case with chinabuye. They complete their orders in a fast turn over time. Chinabuye give you a 30 days money back guarantee and if you are product is in a damaged condition, then you can claim your 30 days money back guarantee but this never happen to chinabuye because people are more satisfied with their products and they always look to order more products from chinabuye.

People always have concern in choosing a best drop shipping company to buy their products. It is always good to search in internet to know about drop shipping company but if you want to experience a good relation and if you want to buy a good electronic product at a very affordable price, then chinabuye.com can be your ultimate choice. Chinabuye success has been always their customers around the world. Customers prefer chinabuye as their best drop shipping company because of their friendly and caring service.

What is e-commerce

An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-established businesses have been selling online for years. When a business has incorporated an e-commerce solution, the business will experience a lower operation cost while at the same time increasing its profit.
Unwanted paper work will be eliminated in e-commerce. All paper work and data can be transferred into an electronic format. It will eliminate shelf-space and data can be searched and accessed in matter of seconds. E-commerce will also automate the sales process. Customers can point and click on the products they wish to purchase and the products will be shipped and received in a matter few days. Since it is technology based the Internet will provide the most recent data available.
There are various reasons as to why every business should incorporate an e-commerce solution in the business operation. They are to establish presence, to network, to make business information available, to serve customers, to heighten public interest, to release time sensitive material, to sell things, to reach a highly desirable demographic market, to open international market, to allow feed back from the customers, etc.
A clear analysis shows that an e-commerce solution wall benefit the business in every aspect. The implementation of an e-commerce solution will generate a brand new revenue stream, expand the market exposure and decrease the operation cost. Many fortunate companies have already adapted e-commerce into their business operation and they have started to establish their presence on the web.

GemStones by Birth

                              Aries


The symbol of this sign is activity – initiative, ambition or creativity. Arians always rise from the lowest to the highest form – from red to white.
Gems: All red stones, like garnet, ruby, red jasper
  Taurus

The symbols of this sign are love and wisdom. Taurus are closely attuned to products of the earth. They need to transform the love of personal to that of selfless service.
Gems: All yellow stones like topaz, citrine, amber



Gemini

This is the sign of duality. It symbolizes life and death, joy and sorrow, health and sickness, abundance and poverty.
Gems: All purple stones, like amethyst or fluorite




Cancer

This symbolizes love and life. The magic power of love is the message and quest of this sign.
Gems: All green stones – emerald, jade, peridot, agate, green jasper


Leo

This is the sign of wisdom and activity. Divinity and humility are keynotes for meditation for the native of this sign.
Gems: All gold and orange stones – amber, orange jasper, carnelian, fire opal, topaz


Virgo

This sign symbolizes reason transformed into wisdom. Knowledge and understanding produce wisdom.
Gems: Amethyst and fluorite




Libra

It symbolizes the balance that must be weighed with the deeds of the year. It symbolizes the unfolding of love leading to unity.
Gem: Yellow stones – topaz, amber, citrine



Scorpio

This is one of the most powerful signs. Its force being dual in aspect, it moves from the lowest depths to the greatest heights. It purifies the animal nature and lifts forces to a higher plane of expression.
Gems: Red and clear crimson stones – ruby, garnet, coral, red jasper, bloodstone


Sagittarius
This sign symbolizes high idealism and noble aspirations. Its highest expression is a spiritualized mind.
Gems: Blue Stones – Sapphire, lapis-lazuli, blue topaz, sodalite




Capricorn

This sign denotes the mystery of the darkest night and the glory of the light. This sign symbolizes the crossing of the bridge of darkness before reaching the radiation of the great white light. The goal for a Capricorn is to conquer one’s ego.
Gems: Black and white stones – black tourmaline, jet, moonstone, opal, pearl

Aquarius

This sign symbolizes promotion of communication and group work. The goal of an Aquarian is to achieve oneness of the whole, or wholeness of the one.
Gems: Clear blue stones – blue topaz, lapis-lazuli, sapphire 

                             Pisces
This sign symbolizes selfless service, the ideal way to achieve success. It denotes the spirit struggling to rescue humanity from greed.
Gems: Soft blue and indigo stones – blue topaz, indigo sapphire, azurite

Virus attacks Android phones in China

Virus attacks Android phones in China
A powerful virus targeting smart phones in China running Google Inc's Android operating system may represent the most sophisticated bug to target mobile devices to date, security researchers said on Thursday.

Anti-virus firm Lookout Mobile Security estimates that the number of phones that have been infected by the virus, dubbed Geinimi, ranges from the tens of thousands to hundreds of thousands.

Researchers said that the virus has yet to wreak havoc, though, and that they were unsure what its authors were seeking to accomplish.

"It is not clear to us what the purpose of it is," said Kevin Mahaffey, chief technology officer for Lookout. "It could be anything from a malicious advertising network to an attempt to create a botnet."

A botnet is an army of enslaved computers that its controllers can compromise for identity theft, use to launch attacks to shut down websites or turn into spam email servers.

Still, the emergence of Geinimi underlines concerns that hackers are shifting from focusing on attacking PCs to targeting mobile devices as sales of the powerful handheld computers take off and users increasingly put sensitive data in their pockets.

Phones become contaminated with Geinimi when users download software applications that have been repackaged to include the virus, according to researchers from Lookout and Symantec Corp.

Tainted programs include versions of the video games Monkey Jump 2, President vs. Aliens, City Defense and Baseball Superstars 2010, according to Lookout.

Lookout researchers said that so far they have only found the tainted software at third-party apps stores targeting the Chinese market. Legitimate versions of the applications in the official Android market appear to be safe, they said.

Compromised phones call back to a remote computer for instructions on what to do at five-minute intervals. Then they transmit information on the device's location, its hardware ID and SIM card back to the remote computer.

So far the remote computers have been collecting data but have not issued any other orders to the infected phones, Mahaffey said.

Liam Murchu, a research manager with anti-virus software maker Symantec, said that infected devices could be ordered to make calls, send text messages and download other malicious software onto the phones.

Top 10 Forbidden Technology

Top 10 Forbidden Technology
The very notion of technology is to help the human race live better. However, in certain countries, some technologies are ban. Below is a list of the Top 10 Technology Bans.

1. UAE, Saudi Arabia Ban the BlackBerry

Americans are used to having BlackBerrys glued to their hands, but after Oct. 11, travelers who fly to the United Arab Emirates will have to check their precious data service at the border. The UAE's telecommunications regulator announced Aug. 1 that because of security concerns, visitors and the some half-million local subscribers will have to learn to live without BlackBerry messaging, e-mail and Internet. The Emirates, and other countries such as India and Kuwait, have long battled with Research in Motion, the Canadian company that makes the BlackBerry, over the device's encryption, which makes it virtually impossible for governments to monitor the content for politically or morally objectionable material.
2. Pakistan Bans Facebook

Turns out South Park + Muhammad + Facebook + Pakistan is not a good combination. On May 19, Pakistan issued a court order banning the social-networking site nationwide, in response to a campaign by some Facebook members called "Everybody Draw Muhammad Day!" The campaign, in the name of free speech, was initially meant to defend a highly criticized South Park episode that featured Muhammad, the Prophet of Islam, in a bear suit. The Facebook page prompted users to submit drawings of the Prophet — some of which were rather explicit and racist — and was seen as "deliberately and recklessly" blasphemous by the Lahore-based court.
3. The Great Firewall of China

China has more Internet addicts than most countries have people, and its leadership knows full well the power of the Web. A government white paper in June hailed the Internet as "a crystallization of all human wisdom" but, in typical Beijing speak, reminded the world that "within Chinese territory, the Internet is under the jurisdiction of Chinese sovereignty. The Internet sovereignty of China should be respected and protected." What this alludes to is the vast, often mysterious set of blocks and bans the authoritarian government has imposed, sometimes relaxed and then reimposed on whole swaths of the online world.

4. Laser Pointers


It seemed like such a good idea. As PowerPoint overtook slide projectors, lasers, once the preserve of missile-defense systems and rock concerts, allowed a presenter to emphasize a point without getting in the way of the pretty slides. Soon, laser pointers became smaller and more powerful. You could have one on your key chain and dazzle your boss in a budget meeting. You could point to the constellation Orion and wow your kids. You could even use one to ward off bears while camping. Or you could shoot a soccer goalie in the eye during a World Cup qualifier (Saudi Arabia vs. South Korea, 2008) or perhaps point it at passing planes. In 2008, following a rash of laser attacks on Sydney passenger jets, the Australian government banned high-powered lasers. Most of Europe followed suit, and while the U.S. allows medium-powered pointers (up to 5 mw), anything more powerful will get you in trouble with the law.
 

5. Colleges Ban Napster

At the turn of this century, there were pretty much two ways to get music: watch MTV (when it played music) or shell out nearly 20 bucks for a CD. Enter Shawn Fanning, a Northeastern University student who invented Napster, a computer program that allowed users to share songs over the Internet. Music was suddenly everywhere, and it was all free. In one of the first great battles over intellectual property in the Internet era, mega-metal band Metallica sued Napster for copyright infringement. But college students had more immediate concerns. Colleges began banning Napster, because the website's file sharing used up all available bandwidth

6. Israel Blocks the iPad

Israel is home to some of the most cutting-edge technology in the world, but its gadget geeks fumed for two weeks in April when Tel Aviv barred the introduction of the iPad on Israeli soil. During that spell, any passenger landing in the country with the device had it confiscated and was forced to pay $12 a day to have it kept in storage. State authorities said at the time that the wi-fi functions of the iPad conformed to U.S. standards, not the European ones in place in Israel, and therefore constituted a potentially disruptive threat to the country's military frequencies — a claim with little evidence to support it. The ban was lifted on April 25, after much hand-wringing and with little explanation.

7. Cell Phones in Cuba

When Fidel Castro decided to officially hand over the reins of power in Cuba to his younger brother Raúl on Feb. 24, 2008, it would have been illegal for Fidel to notify him via commercial cell phone. Over the course of his half-century of rule, Fidel defended the restrictions he placed on Cuba's 11 million citizens by saying they were necessary sacrifices in the "battle of ideas" against enemy numero uno — the U.S. By the time mobile technology spread its networks throughout the interconnected world, it was just another innovation that wasn't destined to arrive on the communist island. Officially, that is. The thriving Cuban black market, facilitated by help from friends and family in Miami, and its pricey cell phones flew in the face of the Commandante's revolutionary rhetoric. So when Raúl consented to reality and had the cell-phone ban lifted on April 1, 2008, it was the first of several major modernizations he would usher in.

8. Music-Free Marathons

You know that sinking feeling you get when you arrive at the gym and realize you've forgotten your iPod at home? Now imagine running 26 miles without music. In 2007, USA Track & Field, the governing body for running, banned headphones and portable audio players like iPods at its official races. The measure was meant to protect the runners' safety (maybe they wouldn't hear course directions) and ensure there wasn't a competitive advantage (because, you know, Bon Jovi's "Living on a Prayer" can really getcha movin'). Luckily for music-loving racers, the rule is nearly impossible to enforce, given the throngs of runners and smallness of the devices. USA Track & Field amended the rule in 2008 to allow the use of headphones and music players in nonchampionship races.
 

9. Google Street View

Street View is the next generation of Google mapping — why squint at the world from the remove of a satellite when you can get a full panoramic view on the ground? By 2008, the company started rolling out its Street View maps, compiled in part by teams of cameramen in cars patrolling nearly every nook and cranny of America's cities and eventually cities in Europe and Asia. But Street View raised obvious privacy concerns. Who wants to be shown exiting a strip club or urinating in public (as some Street View snapshots that went viral revealed)?

10. Apple's Sexy Apps

These apps would have taken the concept of AppleCare to a whole new level. In late February 2010, Apple officially banned from its iTunes Store applications that were deemed too lewd and lascivious. Among the apps deemed out of bounds was iBoobs, in which users toggle through wobbling bosoms on display. Techies saw the move as a sign that Apple would maintain a heavy hand in regulating its marketplace. And it was in that spirit that Apple had earlier rolled out parental controls in the summer of 2009. As for deciding what crosses the line — indeed, some swimsuit-centric apps have gotten the okay — Apple might be wise to embrace the classic threshold for obscenity offered in 1964 by that great temple of romance, the U.S. Supreme Court


How to make money from your blogs

How to make money from your blogs
Many of the individual who write blogs today simply want to share their opinion on something. But then there are the business-minded folks, who have found a way to use blogs, or Web logs, to bring in a little extra pocket money too.

If you're interested in taking it further — blogging for money, if you will — here are five simple strategies that could turn your blog into a moneymaker.

1. Sell advertising. 

This is likely the most common means of leveraging a blog to generate income. If yours happens to become a well-known blog, or one that is well-received in a particular niche, it's always possible to sell ad space on your own. For lesser-known blogs, services such as Google's AdSense or BlogAds enable bloggers to establish ad programs. AdSense's — which lets you select several ads that are consistent with the content of your blog — pays you based on how many readers click on the ads for further information. Even better, it's free. BlogAds, on the other hand, hooks bloggers up with would-be advertisers and levies a commission in return for any ad placements that result. "The nice thing, too, is that the ads are relatively unobtrusive," says Scott Allen, co-author of "The Virtual Handshake: Opening Doors and Closing Deals Online." 
2. Help sell others' products. 
Here is another click-through opportunity. Affiliate programs enable your blog to serve as a conduit between readers and online sites offering various goods and services. All you need to do is to get the traffic volume up.

One popular choice is Amazon.com. If, for instance, you offer book reviews or even just mention a book in passing in your blog, an affiliate program provides a means for your readers to click directly from your blog to Amazon to obtain further information about the book. If they break out the checkbook or charge card, you get paid as well.

3. Solicit contributions for 'worthy cause' blogs.Not every blog-related income opportunity involves hawking goods or services. As Blanche DuBois did in "A Streetcar Named Desire," consider relying on the kindness of strangers. Ask for contributions or donations or to some, beers money. If, for instance, your small-business blog supports a cause or issue in some fashion — say you repeatedly mention tax reform, health care or some other topic — you can always ask for reader support. Even if you've attracted a group of regular followers who simply enjoy reading what you have to say, they may be willing to underwrite their loyalty with a little financial help. Programs such as PayPal make it easy to establish a simple on-site contribution collection button. "There are lots of worthy 'cause' blogs that would qualify for donations from grateful members of the blog community," says Las Vegas communications consultant Ned Barnett.


4. Market your services in your blog. 

Many people associate blogs exclusively with a cyberspace-based soapbox — a place to shout your opinions and little more than that. Granted, blogs are an ideal venue to share your thoughts with others, but don't overlook their capacity to generate new business as well. When appropriate, work in references to what you do and, in turn, what you may be able to offer any would-be client or customer who may be reading your blog. That can spread your opinion and your business moxie at the same time. Instead of short commentaries that begin a dialogue with readers, as many blogs do, write the equivalent of journal articles that demonstrate your abilities, strategies and perspectives on specific issues. When it resonates, it means money.

5. Use a blog to deepen your existing customer relations.

Nor does any marketing material inserted in blog content have to be limited to bringing in completely new business. By using a blog to regularly communicate with existing clients as well as other readers, you can take advantage of the opportunity to fully inform them about everything your business does. That may expand your readers' understanding of the full scope of your products or services. "My blog has helped existing clients determine the range of my skills and services," says Ted Demopoulos of Demopoulos Associates, a Durham, N.H. consulting and training concern. "One client who had only used me for training in the past was surprised at my range of expertise and is now using me for a consulting project. Another who only used me on technical projects is now considering me for a more business-oriented project.

How to make money online with Facebook

How to make money online with Facebook
Many of us already understand to some degree the importance of using social media as a key element of your business marketing; it’s great for search engine marketing, making your website highly findable and getting in front of your potential market. Facebook is, arguably the most successful social networking website to date, but can it be used to promote your business, increase awareness of what you do and, in short, make you more money?

Facebook is a tool any business can and should use to grow their fan club, sell more and stay connected to your target market. Even Dr. Mahathir Mohamad, the ex-Prime Minister of Malaysia has a Facebook account. In fact, some politician in Malaysia are also into Facebook so that they can interact with their followers.

The great news about Facebook is that the service is free unless you choose to participate in the paid ads. With over 100 million members you might find a few within your target market.

Facebook describes itself as a “social utility that connects people with friends (or lost friends), relatives and others who work, study and live around them. People use Facebook to keep up with friends, upload an unlimited number of photos, share links and videos, and learn more about the people they meet.”

Let's look at the top 5 reasons you may want to move your business to Facebook and increase your profits.

Finding business contacts

Facebook allows you to connect with prospects, clients, competitors, potential partners and the gate keepers for your prospects. This tool allows you the opportunity to open up land et all of your contacts get to know you. Building relationships in a very non threatening fashion where people are open to your invitations to connect. A positive strategy is to accept all friend requests. Allow the growth to be viral through participating in conversations and offering help when you can.

Create expert status

Facebook is the perfect place to create visibility and become recognized as the expert in your field. A strategy that includes consistently showing up and providing relevant postings around your area of expertise. But this required you to commit your time to be active with your Facebook activity. Using group and fan pages can help with the visibility. Additionally, using the events function with Facebook will allow you to promote your business events and if you ask your fans to promote to their network, most will. Not only will you expand your reach it is a silent recommendation of your business to their connections.

Target marketing

Members of Facebook share demographics, psychographics, and technographics about themselves that in the past you would have paid a pretty penny for. Through mindful interactions with your target market you can determine where their problems are that you can help them solve. An incredible way to get real market feedback before spending a lot of money. With that said you can also use paid ads on Facebook that allow you to only market to your target market and promote your Facebook pages and/or your products and services.

Get yourself visible, get your blog seen

Just like Ecademy, the best way to get visibility is by being active in the community on a regular basis, so your network and your contacts see you regularly. And again, as with Ecademy, the difference that will make the difference is constantly adding value to the community, being open and honest, transparent and congruent in your presence. Recently, Facebook allow cross update between your Facebook status and Twitter. Meaning, if your post your status at Facebook, it will appeared on your Twitter dashboard. It's like killing two birds with one stone. Your status will be seen by one group of friends in Facebook circle and another group of friends in Twitter circle.

Search Engine Optimization

Facebook is indexed for the search engines. Pages are used for business profiles and should be shared with your fans. Profiles are for personal information. Both pages are indexed for SEO. As a side note Pages allow you to accumulate as many fans as you can and then you can send messages to all of your fans. Just think about the implications of the messaging services for your business. Facebook has an Alexa rating of 5 which means it is the 5th highest traffic website on the internet. Can you say SEO?

Anytime you expand your reach into your target market you can and should increase your profits. The key is to be consistent without coming across as spamming. If your intentions are always to help others that should not become an issue. Include Facebook into your daily or weekly marketing campaigns and as in any marketing strategy the more touches the quicker the results and profits.

-------------------------------------------

7 steps to earn money with Facebook

Step 1 - Setup your Business Facebook account. If you already have a Facebook account, you only need to select a business name. This will give you a separate profile to work with.

Step 2 - Add your profile information. dd your business logo or screenshot of your site for the image, include a URL back to your main site, and add any necessary information to distinguish your profile from the rest.

Step 3 - Add interests. Add interests that other Facebook users can find you with; think of keywords that apply to your business, site, blog or industry.

Step 4 - Add your RSS feed. You can enter an RSS feed to the "Notes" section. Click on "Applications" on the left hand side of the page and follow the steps to add an RSS link.

Step 5 - Sell items in the Marketplace. If you're already selling products on your website, add the same listings on the Marketplace section. You can also list items with your affiliate links here.

Step 6 - Increase traffic by linking to quality content. Create pages and notes on your Facebook account that link back to websites with a high Page Rank. Google and other search engines can increase your own PR after they crawl your Facebook profile and find your main website linked to it.

Step 7 - Network with groups and members daily. Maintain an active presence on Facebook so that people can identify with your business, blog or website and keep up with your notes and postings.

-------------------------------------------

5 ways to make money on Facebook (monetized Facebook application)

1. SELL. Develop applications solely for the purpose of selling them to interested parties. Several applications have already been acquired in this fashion; the most recent example is that of Mozes’ purchase of TextMe.

Actually, I think trying to make an applications is a bad idea ...

* There's too much false hype about applications - There’s a lot of people talking about getting rich with Facebook applications, but I would bet that 99% of those same people have never made their own application. Why not? Because...

* Applications are very expensive to build - I’m not a programming guru, and most likely you’re not either. So if either of us wanted to make an application, we would have to hire a programmer. Even programmers in India are not cheap. Trust me, I’ve seen prices quoted in the thousands, and that’s the low-end! And...

* Most applications fail miserably - You have to invest a lot of money up front and risk losing it all. Over 75% of applications started by ordinary people end up failing. The successful ones are usually developed by companies that have millions of dollars of funding already.

2. DEVELOP. An indirect source of funds: develop applications under contract for third parties. A number of companies have been posting contract jobs over at the Facebook’s developer forums. There exists a large gap in the supply and demand of available Facebook application developers; as a result, finding potential clients to charge reasonable rates should not be a hassle.

3. ADVERTISING. Use advertisements, cross-promotion schemes and affiliate marketing. It is not feasible to use Google Adsense for this since Facebook does not allow JavaScript embedding. Adsense may be embedded through iFrames, which despite being popular among Facebook developers, is against Google’s TOS. Affiliate marketing is a great alternative to advertisements; my own source of income on Facebook is generated through Amazon’s affiliate marketing.

4. MICROPAYMENTS. Sell services within Facebook through micro-payment transactions. PayPal payments made for accessing premium services could potentially yield reasonable income depending on the application’s purpose, size, and prospective users.

5. GET INVESTMENT. If you think you have something big on your hands and lack the funds to scale it, apply for investment through Bay Partners and others who have expressed interest in funding Facebook apps. This would be the likely course of action for a startup with plans to expand globally within and beyond Facebook.

-------------------------------------------

Facebook Has A Money-Making Opportunity That Few People Know About

Did you know ... of the over 70 million active Facebook users, less than 30,000 are using it to make money. That's less than .0005% of the entire Facebook population! *** Registered Facebook users is estimated to be about 100 million.