7 Reason the world will end in 2012

Scientific experts from around the world are genuinely predicting that five years from now, all life on Earth could well finish. Some are saying it'll be humans that set it off. Others believe that a natural phenomenon will be the cause. And the religious folks are saying it'll be God himself who presses the stop button

1. Mayan Calendar

The first mob to predict 2012 as the end of the world were the Mayans, a bloodthirsty race that were good at two things: Building highly accurate astrological equipment out of stone and Sacrificing Virgins. Thousands of years ago they managed to calculate the length of the lunar moon as 329.53020 days, only 34 seconds out. The Mayan calendar predicts that the Earth will end on December 21, 2012. Given that they were pretty close to the mark with the lunar cycle, it's likely they've got the end of the world right as well.

2. Sun Storms

Solar experts from around the world monitoring the sun have made a startling discovery: our sun is in a bit of strife. The energy output of the sun is, like most things in nature, cyclic, and it's supposed to be in the middle of a period of relative stability. However, recent solar storms have been bombarding the Earth with so much radiation energy, it's been knocking out power grids and destroying satellites. This activity is predicted to get worse, and calculations suggest it'll reach its deadly peak sometime in 2012

3. The Atom Smasher

Scientists in Europe have been building the world's largest particle accelerator. Basically its a 27km tunnel designed to smash atoms together to find out what makes the Universe tick. However, the mega-gadget has caused serious concern, with some scientists suggesting that it's properly even a bad idea to turn it on in the first place. They're predicting all manner of deadly results, including mini black holes. So when this machine is fired up for its first serious experiment in 2012, the world could be crushed into a super-dense blob the size of a basketball.

4. The Bible says

If having scientists warning us about the end of the world isn't bad enough,religious folks are getting in on the act aswell. Interpretations of the Christian Bible reveal that the date for Armageddon, the final battle between Good an Evil, has been set down for 2012. The I Ching, also known as the Chinese book of Changes, says the same thing, as do various sections of the Hindu teachings.

5. Super Volcano

Yellowstone National Park in the United States is famous for its thermal springs and Old Faithful geyser. The reason for this is simple - it's sitting on top of the world's biggest volcano, and geological experts are beginning to get nervous sweats. The Yellowstone volcano has a pattern of erupting every 650,000 years or so, and we're many years overdue for an explosion that will fill the atmosphere with ash, blocking the sun and plunging the Earth into a frozen winter that could last up to 15,000 years. The pressure under the Yellowstone is building steadily, and geologists have set 2012 as a likely date for the big bang.

6. The Physicists

This one's case of bog-simple maths mathematics. Physicists at Berekely Uni have been crunching the numbers. and they've determined that the Earth is well overdue for a major catastrophic event. Even worse, they're claiming their calculations prove, that we're all going to die, very soon - while also saying their prediction comes with a certainty of 99 percent- and 2012 just happens to be the best guess as to when it occurs

7. Slip-Slop-Slap-BANG!

We all know the Earth is surrounded by a magnetic field that sheilds us from most of the sun's radiation. What you might not know is that the magnetic poles we call north and south have a nasty habit of swapping places every 750,000 years or so - and right now we're about 30,000 years overdue. Scientists have noted that the poles are drifting apart roughly 20-30kms each year, much faster than ever before, which points to a pole-shift being right around the corner. While the pole shift is underway, the magnetic field is disrupted and will eventually disappear, sometimes for up to 100 years. The result is enough UV outdoors to crisp your skin in seconds, killing everything it touches.

Run Two Google Talk Clients Simultaneously on your Desktop




This simple workaround may help if you maintain two different Google Accounts and have to chat with Google Talk friends who are spread across both these accounts.

The desktop edition of Google Talk comes in two flavors - the standard client and the labs edition. The trick is that you can install both these clients along side each other and even run them simultaneously using different Google Accounts as in the screenshot.

PICTURES THAT PLAY WITH YOUR MIND




SEE THE BABY IN ABOVE PHOTO ??







Making Acrobat Faster

We all use Adobe acrobat reader
we all get annoyed by the fact that it takes 10-20 seconds to wait for the application to load..
To make it faster......
Here's how to do it:
Go to C:\Program Files\Adobe\Acrobat 7.0(or whatever version)\Reader\
Move all files from the plug-in folder to the optional folder.
(Cut and Paste ie cut and paste all the files and folders (do not just copy))
You're done!!
Now Acrobat Reader is as fast as a notepad.

Computer Security 101: The Basic Triad

I've always maintained that there's certain things you should do to a computer no matter what else you do on a computer. One of them is using a USB Optical mouse, but that's just a personal opinion. Running proper computer security software, on the other hand, is considered mandatory by anyone who has ever caught a virus and most people who make their living getting rid of them. The general concept is composed of a triad of problems and solutions. The problems are keeping bad things out, taking out bad things if they get in, and restoring your system if you can't get them out. The solutions are Firewalls, AntiVirus software, and Regularly Scheduled Backups. The problem comes when people forget any one of these three things. In this mini-guide, I'll tell you how to keep yourself from posting here in the past tense on about 60% or more of the problems we get. Links to download these tools will be provided at the end of this guide.
Note: In the example given below, Alpha will refer to your computer, and Beta will refer to some other computer - one on the internet trying to access your computer.
First of all is a firewall. The good news is that XP includes a built in firewall. It's not perfect, though. Firewalls can be of two types - Incoming and Outgoing. The problem is that the distinction between Incoming and Outgoing is often blurred. For example, a common system used to remotely access a computer (in this case, more often legitimately than as a virus) is VNC. VNC runs a server on Alpha and then Beta can access it from anywhere on the internet using a VNC client. For many years, to do this, you'd have to open the Incoming port on Alpha for VNC (5900) for Beta to be able to connect, but now you don't. If Beta has his client listening in "reverse connect" mode, then Alpha can start the connection and in doing so it gets around the windows Firewall, because it is seen as an outgoing connection by windows, and the Windows Firewall does not block outgoing connections at all. In this way, your computer can be remotely accessed and evade the windows firewall entirely. The only real solution to this is to use a third-party firewall, and you have several options. ZoneAlarm and Sunbelt Kerio Personal Firewall are both free options, and both Kerio and ZoneAlarm offer more advanced systems you can use for a price. These both block incoming and outgoing connections, therefore fully firewalling your computer.
Your next "line of defense" (though it's more like "offense in your own end zone" than defense) is Antivirus Software. Common Software for this include Symantec Norton AntiVirus and Norton Internet Security (which also includes a good firewall). McAfee has typically been seen as a secondary vendor though in modern times, both Symantec and McAfee are equally effective. ClamWin is also available, but does not offer real time scanning. Avira AntiVir, Avast!, and NOD32 are also good AntiVirus packages. Most new computers come with one of these included. So you already have an AntiVirus software, right? Good, but you're still not done!!! AntiVirus software is just that - AntiVirus. It's not AntiSpyware, AntiMalware, of AntiTrojan, and you have to protect against all of those, too. Two key products stand out to do this. One is Spybot Search & Destroy, which is open source and free. Spybot is the gold standard for AntiMalware. On the other end of the spectrum, Windows Defender from (who else?) Microsoft has been shown to do a good job. At one point after Microsoft bought out Gator they allowed Gator's malware through Windows Defender (back then under the name Microsoft AntiSpyware) and it's due to this that it's always a good idea to run both programs to allow each of them to check out the other. Another noteworthy program is SpywareBlaster, which does not offer any real time protection, but instead patches Internet Explorer and Firefox to prevent most Spyware from getting in in the first place. Running these three makes most, if not all systems impervious to Spyware.
If the above fails - and it will at some point - then your last remaining option is to restore a backup you've made in the past. What, you've never backed anything up?! Well, to make it as easy as it can be, you'll need 2 things to do this. First of all, backup (unlike the other two parts of the triad) will require you to buy additional hardware. In this case, you'll need a USB Hard Drive. The Hard Drive in question has to be AT LEAST 2/3 of the size of your main system drive. If your computers is really slow (1.5GHz or less) you'll want to get a USB HDD that's the same size as your system drive because compressing the drive backup will be way too slow. The second thing you'll need is a copy PING. PING (Partimage Is Not Ghost) is a Linux Live CD that you can boot from. Once you boot from PartImage, you can backup your entire hard drive to a disk image file. Then, if your system ever crashes, you simply boot from the PING CD again and restore the disk image. Of course, for this to be effective, you'll have to make images on a regular basis. How often you do so depends on how much you use your computer and what you use it for. If, for example, you only web browse for an hour a day, then imaging the computer once a month is fine. If you do major graphics design work that's impossible for you to reproduce later, backing up once a week or even twice a week isn't entirely out of the question. Your main goal is to minimize the amount of work you have to redo in the event that your computer crashes and you have to restore the image.
That's the basic computer security triad. There are several other useful strategies you can follow, too. For example, you can store any and all of your documents on a network server. If it's not a program, store it off-site. Then image your computer with nothing more than windows and your programs. After this, when your computer crashes (if you don't do any major configuration changes) you lose nothing when you image the system. Along the same lines, setting up two separate partitions or using a USB Hard drive for document storage accomplishes the same thing, but some of the major viruses will spread between local drives (whereas fewer of them will spread through the network). While you're at it, you can try software like DeepFreeze, which prevents any and all changes to the C: drive of your computer. You can also use Sandboxie to prevent just one program (such as your web browser, which is how most spyware is caught, or email to prevent most viruses) from writing to the hard drive while letting all your other programs through. This does not work sometimes, though, because this prevents your browser from downloading files and prevents your email client from storing email on the hard drive, so over time you have to download the same messages over and over.
So that's it. Here's the links.
* ZoneAlarm by Zone Labs -
http://www.zonelabs.com/store/content/home.jsp
* Kerio Personal Firewall by Sunbelt Software -
http://www.sunbelt-software.com/Kerio.cfm
(Note there's another firewall with the same name that is not free.)
* Symantec, makers of Norton AntiVirus and Norton Internet Security -
http://www.symantec.com/index.jsp
* McAfee, Symantec's primary competition - http://us.mcafee.com/
* SpyBot Search & Destroy –
http://www.safer-networking.org/en/index.html
* Windows Defender by Microsoft -
http://www.microsoft.com/athome/security/spyware/software/default.mspx *
*SpywareBlaster by Javacool Software –
http://www.javacoolsoftware.com/spywareblaster.html
* PING, or Partimage Is Not Ghost -
http://ping.windowsdream.com/
* Faronics, makers of DeepFreeze -
http://www.faronics.com/
* Sandboxie -
http://www.sandboxie.com/
Now stop reading and go secure your system! Good luck.

There was an error in this gadget
This Day in History

Today's Birthday

In the News

Quote of the Day
There was an error in this gadget