Monday, July 20, 2009

Do You Know How To Remove Spyware From Your Computer?

Do You Know How To Remove Spyware From Your Computer?

Spyware is rapidly becoming a major problem for Internet users. It is estimated that 9 out of 10 computers are infected with Spyware or adware or both. Spyware may be responsible for 50 % of all computer crashes. Spyware runs silently, and you may not be aware that your every move on the Internet is being observed and recorded. If a user does not detect and remove Spyware from his computer, all his files may get infected, and it may stop working. All his passwords, credit card numbers, and other personal information may be stolen before he can realize what is going on.

Once spyware has been removed, the computer will run much faster. It is worth while for you to find and use the best spyware removal software available.

Features Of Good Spyware Removal Software. A few features to consider, while searching for spyware removal software products, are:

It should offer complete protection from spyware, keyloggers, remote access Trojans (RATS), browser hijackers and adware.

A good spyware program will offer automatic updates, to provide protection from the latest spyware threats.

The spyware product should offer technical support, so you can call or e-mail someone, if you have a technical problem.

A good customer service back up also shows that the manufacturer can be trusted to look after the needs of the customer in the long run.

How Does It Work? It is very difficult to find and remove spyware software from a computer manually. Spyware protection software detects and removes spyware and adware from your computer automatically. It can also protect your computer from data thieves, hackers, malicious e-mail, and other threats.

There are many free spyware protection software products available. These programs can be used to detect and remove spyware and adware that is already present in your computer. Many types of spyware install themselves on your computer again, after you have deleted them. Free spyware removal programs can help you to assess the problem.

A permanent solution may be to get the best spyware solution product available.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , ,

Tuesday, July 14, 2009

The Unemployment Rate in Asia

The Unemployment Rate in Asia

The unemployment rate became a hot topic in the past few months when it rose to 3.5 per cent, a recent high for almost 10 years. The jobless rate was higher than the 3.2 per cent unemployment rate recorded in the May to July period. The underemployment rate in the June to August period rose to 2.5 per cent from 2.3 per cent in the May to July period. Until recently, most workers who lost their jobs were from the manufacturing sector. They were middle-aged factory workers with few skills and little education. But in recent months a large number of employees have been laid off in the retail and restaurant businesses. Unemployment has spilled over to the service sector from the manufacturing sector.

Hong Kong is facing a prolonged economic downturn. The high unemployment rate has raised many social and economic problems. For example, the number of people who commit suicide has increased. It is because more people lost their jobs for a long time. It is a serious threat to the lives of the poor. The unemployed people may also feel that there is no reason to live. As a result, they will commit suicide to solve the problem. Moreover, the high unemployment rate results in the increase of the rate of crime. There was an unemployed man who stole rice because he was too hungry, and he did not have money to even buy food! We can know how serious the unemployment rate is by the way the higher unemployment rate causes lower purchasing power of people. All kinds of business are affected. Many people lose confidence in the economics of Hong Kong. They do not believe unemployment will be improved. Some say that the government should provide immediate assistance for the jobless. Some also say unemployment is due to the attraction of cheap labor across the border. The government can no longer play the role of a bystander.

All of these show the influence of the unemployment situation. In spite of many people talking about unemployment, everyone will be concerned about this topic. The following sections will analyze this hot topic.

Reasons for unemployment in Hong Kong

1. Faster growth in total labor supply relative to that of total employment

In 1993 and 1994, the increase in the Hong Kong labor force was 2.9% and 3.5% respectively. At the end of 1993, their total labor supply was 2,970,000. Change in the total labor supply was determined by the population growth, total employment, and the emigration condition. If the population growth and the total employment is stable, the extra labor supply will increase the total labor supply. This extra labor supply came mostly from the influx of illegal immigrants from China, imported labor ( 30,000 ), hiring of expatriates ( net increase of 40,000 from 1992 to 1994 ) and the returnees from overseas. Thus, the supply of labor is greater than the demand, and causes pressure on employment.

From March to May of 1995, the total labor supply had risen 4.4%, but the total employment had just increased 3.6%, so this aggravated the unemployment rate. However, this is just a superficial reason. The following reasons can explain the reason of unemployment in a deeper way.

2. Change in the economic structure

The economic structure in Hong Kong has changed from labor intensive to high technology and large capital intensive. Also, it changes from manufacturing oriented to service oriented industries. Therefore, the factories move to China for cheap labor. From 1988 to 1994, there were 60,000 jobs lost each year. Of the total employment of different sectors, the portion of the manufacturing industries dropped from 27.4% in 1990 to 17% in 1994. Many laborers are released from the manufacturing industries. Though there was a great demand for labor in the service sector, many of the unemployed still could not find their job because of job matching problems. They did not have the skills demanded in the job market, so there were both a lot of vacancies of jobs and a lot of unemployed laborers. This kind of unemployment is called structural unemployment, which is a kind of involuntary unemployment.

3. China Policy

Recently, the Chinese government tried to control the economy by macro policy, such as implementing the monetary policy and inflation control policy. This lead to a slowdown in the Chinese economy as well as the flow of Chinese capital to Hong Kong for speculation and investment. This affected Hong Kong's economic growth simultaneously.

In the past, the prosperous China-Hong Kong trade motivated the purchasing power in the service sector of Hong Kong. However, there have been some changes in the investment environment in China recently. First, it is the high inflation rate. For the past two years, the inflation rate was about 20%. Under the macro policy, the recent figure is 18.5%, which is still quite high. Second, the government began to raise the property tax. With these two factors, the profitability of investing in China decreased. Therefore, the purchasing power of Hong Kong's service sector was directly affected, and so many laborers were being dismissed.

4. High rent and high inflation rate

8 years of continuously high rent and the high inflation rate make the production cost of the Hong Kong enterprises, especially the labor cost , increase tremendously. On one hand, this encourages the enterprises to move their labor-intensive industries to other place where the labor cost is cheaper. On the other hand, these enterprises try to dismiss labor or reduce the engagement of their work force. Many change to the use of more capital and technology to reduce their production costs, as well as increase standardization and productivity. Many enterprises could not stand the high rent, and closed down, such as the Japanese department store, Mitsubishi. A lot of laborers were then released and became unemployed.

5. Non-intervention government policy

The Hong Kong government lacks long term planning in their economy. They just try to adopt a non-intervention policy to their economic problems. In fact, in the 1980s, the economic structure was changing. The manufacturing industries were declining. However, the government did nothing to help.

The government, for a long time, ignored the research and development of the high technology application. Thus Hong Kong's industrial technology cannot catch up with the other three dragons. This explains why the productivity of the Hong Kong people has been reduced recently. In 1990-1994, the productivity of Hong Kong labor was 3.8%, but Taiwan and South Korea had 4.8%, and Singapore was 4.5%. From this, we can see that the competitive power of the Hong Kong industries was weakening, and high unemployment is inevitable.

Government carried out a high land policy, which lead to a tremendous rise in the property price, so the rent of the shops and factories increased. The widespread implementation of the sewage treatment charges also increased the production cost. This is a reason why the factories moved to the north or closed down.

6. Labor importation scheme

Is it the main reason responsible for the rising unemployment rate in Hong Kong?

a) The viewpoint of the government

Economist Tang Kwong-yiu said that the labor importation scheme is not the main responsible for the rising unemployment rate in Hong Kong. He attributed it to the faster growth in the total labor supply relative to that of total employment. Students looking for summer jobs have aggravated the unemployment problem during the last three months. The influx of illegal immigrants from China, the return of overseas Chinese and the hiring of expatriates also aggravated the job shortage. However, Mr. Patten proposed replacing the Labor Importation Scheme with a Supplementary Labor Scheme that would aim to cut the number of imported workers from 25,000 to 5,000 from January.

b) The viewpoint of the Democratic Party

Though the labor importation scheme is not the main reason, it's implementation aggravated the unemployment problem. They believe that the change in the economic structure is the main reason. The problem became obvious in the mid 80's as many factories moved to the north. However, the government did not intervene. They still wanted a termination of the scheme so that the problem can at least be lessened.

c) The viewpoint of the labor union

They believe that this scheme should be stopped at once. They were disappointed by the Governor's failure to scrap the imported labor scheme for the new airport project. Construction workers would continue to see their jobs being taken by foreign laborers. Unionist Lee-Cheuk-yan said that in Hong Kong, they don't need any imported labor, not even 5,000.

d) The viewpoint of the economists

i) Mr. Lui from the Economic Development Research Center says research has been done, and the result is that the change in the economic structure contributed 60% to the rising unemployment rate. The labor importation scheme is just a minor factor, and the influence to the labor market is not significant. The scheme was not just carried out in Hong Kong, but also in the USA and Germany. We cannot see that imported labor has significant influence on the unemployment rate. This is because imported labor takes away the job of the local laborer, while at the same time, they create job opportunities for themselves. If the company uses imported labor, the production cost can be reduced. This will keep the enterprises from moving to other places, or even will attract more investors to Hong Kong. This will benefit the local labor market.

ii) Mr. Wong from the Management Department of Lingnam College does not agree with the research of Mr. Lui. He believes that, though the importation scheme is not the main reason, it is the root of the sin. The influence that it brings to the economy is not insignificant. What's wrong with this scheme is that the government officials ignore the opinion of the public, and make this scheme a long-term policy. The imported labor are widely employed in all kinds of jobs, so the government has not considered the employment problem of the labor released out from the declining manufacturing industries.

Despite the effect of the labor importation scheme, this economic argument has changed to a political issue, making it difficult for a political party to gain votes in the election. They all try to bargain with the government officials and propose bills to debate in the Legislative Council for a termination of the scheme.

In previous parts, we have explored the reasons of high unemployment rate; now we will begin to describe the situation of Hong Kong's unemployment. It includes a description about the current unemployment situation and the changes in the unemployment rate in the past 10 years, as well as the underemployment rate. We will also analyze the change in the labor force.

The unemployment rate in specific sectors will be analyzed, so that it can help to study the structural change in the unemployment rate. The reasons for the structural change will also be analyzed.

A. Unemployment, Underemployment, and duration of unemployment

1. Unemployment in HK

The recent unemployment figure in the 2nd quarter of 1995 was 3.2%. It was the highest figure in nine years. Many people, as well as the government, have noticed this significant increase in the unemployment rate. It must be concluded that unemployment in HK changed from short-term to long-term. The unemployment in 1989 was 1.2%, it gradually jumped to 3.2% in 1995, with a continuous increase year to year, but no decrease in this 7-year period. Before, the problem of the higher unemployment rate only extended from 2 to 3 years. This shows how the unemployment changed from short to long term.

2. Underemployment in HK

When a person who works for pay less than 35 hours in a month, he is said to be under-employed. In the 2nd quarter of 1995, the underemployment rate reached 2.1%. There were about 589,000 people who were under-employed.

3. Duration of unemployment

In 1994, there were 21,000 persons unemployed for more than 3 months; it contributed 26.2% of the total number of unemployed workers. The figure jumped to 31,000 in 1995, the contribution also increased to 31%.

Before, they were temporarily unemployed, but they can soon find a new job within a short period. But now, they have to face a permanent problem of losing their job.

B. Structural change in unemployment

According to the statistical data, the nature of the unemployment rate changed very much. Before, labor in the manufacturing sector suffered most from the economic slowdown and the change in economic structure. However, the retail and service sector also faced this problem. The unemployment problem extended from the manufacturing sector to nearly all industries in HK.

1. Manufacturing sector

In 1987, the manufacturing sector employed about 800,000 workers, but it gradually dropped to 395,000. There was an average decrease of 50,000 to 60,000 persons employed.

The unemployment rate in the manufacturing industry increased from 43.9% in 1989 to 53.6% in 1994. There are several reasons explaining the increase. First, owing to the economic slowdown and structural change, the manufacturing industry was badly affected, and many firms were closed. To save costs, the factories moved their production line to mainland China to take advantage of cheap labor. It left many local workers unemployed. In addition, the workers in the manufacturing industry have low skills, and they are incapable of finding other jobs requiring special skills. Another reason factor, which is controversial, is the importation of labor. Because their wages are lower, local workers are replaced, because the manufacturers want to save money. As a result, unemployment become more serious in this sector.

2. Retailing sector

Local retail industry prospered from the 1980s, due to economic growth and the full confidence of investors making investment in HK or in China. But in recent years, the retail industry also suffered a slowdown.

According to statistical data, the retail industry had an average 1.9% growth in sales volume. However, in April 1995, the figure decreased by 2% compared with the same period in the previous year. Also, the unemployment rate in this sector increased.

In the first quarter in 1995, the total unemployment in the retail industry contributed 30% of the economy's total, which is the second highest share, while the largest share is the manufacturing industry.

3. Service industry

The service industry continuously grew in the 1980s and early 1990s. Many people were employed in this sector. However, it also suffered from the economic decline in later years. The service sector includes the hotel service, transportation service, food and beverage, financial and asset management, and so forth.

In the service sector, there were about 15,000 people unemployed in 1995, which represented a 21% increase compared with the previous year. It is higher than the total unemployment figure in the manufacturing industry.

The reasons are basically the same, in explaining the high unemployment rate in both the retailing and service industries. The economic slowdown led to reduced investment and consumption of goods and services. Economic decline in China also reduced investment projects in the Mainland, thus demanding less service.

With a high inflation rate, people are more sensitive to the way they spend money. Now, they spend less on buying goods and consuming services which are unnecessary. Therefore, large service corporations, such as HK Telecom, began to cut the labor force to fit with the demand.

More importantly, the service industry started to operate in Mainland China. The decline in the service industry cannot absorb the large labor force, especially workers who leave from the manufacturing industry.

4. Construction industry

The unemployment rate in this sector is lower when compared with the manufacturing, service, and the retailing industries. In 1995, the unemployment rate in construction decreased, but the underemployment rate increased. There are some large projects that led to a greater labor supply in the construction sites. For example, the New Airport project demanded many skilled construction laborers. On the other hand, the demand of lower-skilled construction workers decreased because of the decline in the estate market.

The large construction projects are often technology oriented, and the machines and equipment is more difficult to manipulate. So, unemployed construction workers from the estate market cannot transfer to the large project because they are not qualified to operate the high-tech machines. Therefore, some vacancies are unfilled by the low-skilled workers. Unemployment in this sector remains unsolved.

C. Vacancies by different sectors in HK economy

It is arguable that the unemployment in HK is not so serious, because there are still many vacancies . However, the problem is that the unemployed workers cannot find the job that fits them, or they refuse to accept a lower wage. On the other hand, employers may not employ workers of lower skills. So, there is a situation that the demand and supply of labor skill is not matched.

D. Relationship Between Unemployment Rate and Inflation Rate

A general belief tells that there is a negative relationship between the unemployment rate and the inflation rate. Some economists claim that the contemporary economic situation in Hong Kong, high unemployment rate associated with a relatively low inflation rate, is a predictable result from periodic adjustment of the built-in economic mechanism. Since 1987, the high inflation rate had pushed the costs of production and operation up to a very high level. Therefore, people suffered from a reduction of purchasing power and negative wealth. Meanwhile, people tend to save more because of their fear of the instability arising from the transition of sovereignty in 1997. On the other hand, policy-makers tried to release the high inflation rate by means of imposing a higher interest rate. The general price level began to fall after a continuous increase for eight years.

Inflation rate & Unemployment rate in HK, 85-95

The high unemployment rate is caused by many factors, like change in economic structure, importation of foreign labor, which will eventually lead to a negative wealth effect, and a reduction in the general consumption level. The low inflation rate is traded off by a high unemployment rate. On the other hand, the serious unemployment rate demonstrates that the economy moved from an economic boom period to a slump which was accompanied by a low inflation rate.

Implication - Cost of Unemployment

Unemployment is costly to society. It affects Hong Kong's economy directly and indirectly. There is a loss of real output in the economy. When the economy does not generate enough jobs to employ all those who are willing to work, a valuable resource is lost. Potential goods and services that might have been enjoyed by consumers are lost forever. This is the real economic cost of high unemployment. Unemployment leads to the decline of purchasing power, and negative wealth results. According to the Keynesian Consumption Theory, current consumption depends on current income. The permanent income hypothesis also emphasizes how the future affects consumption today by pointing out that people save in good years to carry them through bad years. Changes in consumption will be affected by changes in wealth. As a whole, consumption decreases under the negative wealth effect. The level of consumption and investment gradually declines in sectors such as the service industry, the retailing industry, the food industry, and the manufacturing industry. Some industries may even shut down. Employees lose their jobs as well. This becomes a spiral effect in the economy. The costs of unemployment should also include the searching costs for new jobs. In Hong Kong, there is a problem of frictional unemployment. People leave jobs for all sorts of reasons, and they take time to find new jobs. Inevitably there is a pool of people who are “frictionally" unemployed while in the course of finding new jobs. But in attempting to find a job (at the most favorable wage rate), the worker incurs search costs in terms of extra time, effort, and wages. The wise worker will weigh the gain from the extra search against it’s costs. If some workers found that it is difficult to find a new job, they may accept lower wages offered by the employers in order to save the search cost. There may be a trend that the wage rate gradually decreases and the negative wealth effect still appears. Also, when there is unemployment, there is a loss of accumulated work experience, an invaluable asset to the economy. Depreciation of human capital results. This is the social cost of unemployment.

Moreover, high unemployment leads to a higher incidence of psychological disorders, divorces, suicides, mental anxiety, and ill health. People's self-respect and their health are harmed as a result of unemployment.

Furthermore, the private cost of unemployment for an individual may be greatly reduced if we consider the value of leisure (or of not working), and if unemployment benefits are offered by the government.

Finally, unemployment is not only an economic aspect, it also becomes a political conflict. As we know, conflicts are found between two sides. On the side of the general public, labor unions and democratic parties, the influx of a foreign labor force is the main reason for unemployment. They urgently ask the government to restrict their entrance. On the side of the Hong Kong government, the enterprises and the capitalist, it is not the main reason. Unemployment is mainly caused by the structural change of the economy. However, the request and discontent of the public forced the government to make a concession. That is to make regulations to restrict the influx of foreign workers.

Solution

Finding ways to solve the unemployment problem is of the utmost importance now. Since the supply of labor is so much greater than the amount demanded, one way is to let the market mechanism determine the relationship between the labor supply and the labor demand. The government can also implement some new plans to help lower the high unemployment rate. Here are some suggested solutions:

1) Correct the Hong Kong people's attitude on “full employment," to let them realize that Hong Kong's unemployment level will be at a rather stable rate of 3-4% these few years. So, by maintaining the unemployment rate at 2-3%, it can help to control the increase in labor cost as well as the stability of the Hong Kong economy.

2) The high unemployment rate of Hong Kong is partly attributed to the increased number of imported laborers. Therefore, the simplest way is to reduce the number of imported laborers. The government should adjust the necessary number of imported laborers so that it can match with that of the market labor demand. Actually, the increase in the number of imported laborers is due to their willingness to accept lower wages than local workers. Workers are not always passive; they should voice their opinions and fight for their own rights, like strengthening the power of the labor unions, and not just relying on the government for implementing new policies to combat unemployment.

3) The government could lower the requirements for applying the unemployment allowance to help workers solve their problem. However, the workers should not just wait for help from the government. They should actively seek jobs, and can show their discontent to the government for unfair treatment. Some companies also employ illegal workers. The government can also implement new laws, such as that in the United Kingdom, so that it will be a criminal offense if the employers employ illegal workers. This can help to deter them from hiring those illegal workers.

4) Increasing investment and production capacity can also be a solution. The government can do this by increasing its expense and decreasing the profit tax rate so as to raise investment interest in the local industry. If there is an increase in investment, there will be more employment opportunities, increasing both the supply and demand. Increasing government spending can stimulate aggregate demand and hence decrease the unemployment rate. By doing these, it can also strengthen Hong Kong's competitiveness with other Asian countries.

5) It is important for the government to manage the increase in labor costs, as well as increase employment and labor productivity. There should be strategies to maintain economic growth at a steady rate, to control labor and labor costs from growing too fast, and to prevent the increase in the inflation rate due to economic growth. People do not possess the necessary skills needed to perform some specific tasks.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , , , , , , ,

Sunday, July 12, 2009

The Computer Underground

The Computer Underground
Align Center
The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast to the media's description of the ultra intelligent and sophisticated teenage "hacker." The majority have in common the belief that information should be free and that they have "a right to know." They often have some amount of dislike for the government and the industries who try to control and commercialize information of any sort. This blog report attempts to expose what the CU truly is, and dispel some of the myths propagated by the media and other organizations. This blog report also tries to show the processes and reasons behind the criminalization of the CU and how the CU is viewed by different organizations, as well as some of the processes by which it came into being. What the CU is, has been addressed by the media, criminologists, security firms, and the CU themselves; they all have a different understanding or level of comprehension. This blog report attempts to show the differences between the views, as well as attempting to correct misunderstandings that may have been propagated by misinformed sources. The differences between the parties of the CU such as "hackers," "crackers," "phreaks," "pirates," and virus writers, have rarely been recognized, and some deny that there are differences; thus this blog report attempts to give a somewhat clearer view, and define exactly what each party is and does, as well as how they relate to one another.

Every individual in the CU has a different level of sophistication when it comes to computers, from the height of the advanced virus writer and network hacker to the pirate who can be at the same level as a novice computer user. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms to confront the "hackers." The average person's knowledge about the CU has been derived mostly from the media. The media gets their information from former CU individuals who have been caught, from law enforcement agents, and from computer security specialists. The computer underground, as it is called by those who participate in it, is composed of people adhering to one or several roles: "hacker," "phreaker," "pirate," "cracker," and computer virus developer. Terms such as these have different meanings for those who have written about the computer underground, such as the media, and those who participate in it.

The media's concept of the Computer Underground is the main cause of the criminalization of the activity, and has largely occurred as the result of media dramatization of the "problem." In fact, it was a collection of newspaper and film clips that was presented to the United States Congress during legislative debates as evidence of the computer hacking problem. Unfortunately, the media assessment of the computer underground displays a naive understanding of CU activity. The media generally makes little distinction between different types of CU activity. Most any computer- related crime activity can be attributed to "hackers." Everything from embezzlement to computer viruses have, at one time or another, been attributed to them. Additionally, hackers are often described as being sociopathic or malicious, creating a media image of the computer underground that may exaggerate their ability for doing damage.

The labeling of the CU and especially hackers as being "evil" is well illustrated by these media examples. The first is from Eddie Schwartz, a WGN-Radio talk show host.

Here Schwartz is addressing "Anna," a self-identified hacker that has phoned into the show: “You know what Anna, you know what disturbs me? You don't sound like a stupid person but you represent a . . . a . . . a . . . lack of morality that disturbs me greatly. You really do. I think you represent a certain way of thinking that is morally bankrupt. And I'm not trying to offend you, but I . . .I'm offended by you!” (WGN Radio, 1988).

Another example is from NBC-TV's "Hour Magazine" featured a segment on
"computer crime." In this example, Jay Bloombecker, director of the National Center for Computer Crime Data, discusses the "hacker problem" with the host of the show, Gary Collins.

“Collins: . . . are they (hackers) malicious in intent, or are they simply out to prove, ah, a certain machismo amongst their peers?”

Bloombecker: “I think so. I've talked about "modem macho" as one explanation for what's being done. And a lot of the cases seem to involve proving that he . . . can do something really spiffy with computers. But, some of the cases are so evil, like causing so many computers to break, they can't look at that as just trying to prove that you're better than other people.”

GC: “So that's just some of it, some kind of "bet" against the computer industry, or against the company.”

JB: “No, I think it's more than just rottenness. And like someone who uses graffiti doesn't care too much whose building it is, they just want to be destructive.”

GC: “You're talking about a sociopath in control of a computer!”

JB: “Ah, lots of computers, because there's thousands, or tens of thousands of
hackers.” (NBC-TV, 1988).

The media's obsession with the computer underground, that is generally labeled as hacking, focuses almost entirely upon the morality of their actions. Since media stories are taken from the accounts of the police, security personnel, and members of the computer underground who have been caught, each of whom have different perspectives and 20 definitions of their own, the media's definition, if not inherently biased, is at best inconsistent.

Criminologists are less judgmental than the media, but no more precise. Labels of "electronic trespassers," and "electronic vandals," have both been applied to the CU's hacking element specifically. Both terms, while acknowledging that "hacking" is deviant, shy away from labeling it as "criminal" or sociopathic behavior. Yet despite this seemingly non-judgmental approach to the computer underground, both Parker and Bequai have testified before Congress, on behalf of the computer security industry, on the "danger" of computer hackers. Unfortunately, their "expert" testimony was largely based on information culled from newspaper stories, the objectiveness of which has been seriously questioned.

Computer security specialists, on the other hand, are often quick to identify the CU as criminals. Similarly, some reject the notion that there are different roles and motivations among the computer underground participants and thereby refuse to define just what it is that a "hacker" or "phreaker" does. John Maxfield, a "hacker expert," suggests that differentiating between "hackers" and "phone phreaks" is a moot point, preferring instead that they all just be called "criminals." The reluctance or inability to differentiate between roles and activities in the computer underground, as exhibited in the media and computer security firms, creates an ambiguous definition of "hacker" that possesses two extremes: the modern-day bank robber at one end, the trespassing teenager at the other. Thus, most any criminal or mischievous act that involves computers can be attributed to "hackers," regardless of the nature of the crime.

Participants in the computer underground also object to the overuse and misuse of the word hacking. Their objection centers around the indiscriminate use of the word to refer to computer-related crime in general and not, specifically, to the activities of the computer underground: Whenever the slightest little thing happens involving computer security, or the breach thereof, the media goes crazy and points all their fingers at us 'nasty hackers.' They're so ignorant it's sick . . . . whenever the media happens upon anything that involves malicious computer use it's the "HACKERS." The word is a catch phrase it makes mom drop the dishes and watch the TV. They use the word because not only do they not really know the meaning, but they have lack of a word to describe the perpetrator. That's why hacker has such a bad name, it’s always associated with evil things and such. I’ve never seen a phreaker called a phreaker when caught and he's printed in the newspaper. You always see them "Hacker caught in telephone fraud." "Hacker defrauds old man with phone calling card." What someone should do is tell the media to get it straight.

The difference between the different elements of the computer underground has been generally obscured by the media. Terms such as Cracker, Phreaker, Pirate, or Virus writer, have been generally replaced with the all encompassing word "HACKER." Each element is associated with the computer underground, and some are bigger players than others; but none of them can qualify individually as the total sum of all the elements.

There are major differences between the elements of the CU that is rarely understood by someone on the outside.

The use of the word "hacker," which is now generally accepted to be part of the CU, has gone through drastic changes in definition. "Hacker" was first applied to computer related activities when it was used by programmers in the late 1950's. At that time it referred to the pioneering researchers, such as those at M.I.T., who were constantly adjusting and experimenting with the new technology. A "hacker" in this context refers to an unorthodox, yet talented, professional programmer. This use of the term still exists today, though it is largely limited to professional computing circles. The computer professionals maintain that using "hackers" (or "hacking") to refer to any illegal or illicit activity is a corruption of the "true" meaning of the word. Bob Bickford, a professional programmer who has organized several programmer conferences, explains: “At a conference called ‘Hackers 4.0' we had 200 of the most brilliant computer professionals in the world together for one weekend; this crowd included several PhD's, several presidents of companies (including large companies, such as Pixar), and various artists, writers, engineers, and programmers. These people all consider themselves Hackers: all derive great joy from their work, from finding ways around problems and limits, from creating rather than destroying. It would be a great disservice to these people, and the thousands of professionals like them, to let some pathetic teenaged criminals destroy the one word which captures their style of interaction with the universe.”

The more widely accepted definition of "hacker" refers to one who obtains unauthorized, if not illegal, access to computer systems and networks. This definition was popularized by the movie “War Games” and, generally speaking, is the one used by the media. It is also the definition favored by the computer underground. Both the members of the computer underground and professional computer programmers claim ownership of "hacker," and each defend the "proper" use of term. However, since computer break-ins are likely to receive more media attention than clever feats of programming, the CU definition is likely to dominate, simply by being used more often.

A "computer hacker" could be defined as an individual, associated with the computer underground, who specializes in obtaining unauthorized access to computer systems. "Hacking" refers to gaining access and exploring computer systems and networks. "Hacking" encompasses both the act and the methods used to obtain valid user accounts on computer systems. "Hacking" also refers to the activity that occurs once access to another computer has been obtained. Since the system is being used without authorization, the hacker does not, generally speaking, have access to the usual operating manuals and other resources that are available to legitimate users. Therefore, the hacker must experiment with commands and explore various files in order to understand and effectively use the system. The goal here is to explore and experiment with the system that has been entered. By examining files and, perhaps, by a little clever programming, the hacker may be able to obtain protected information or more powerful access privileges. Once a hacker has managed to gain access to a computer system, he/she will generally try make sure that his/her activities are hidden, so that he/she can keep access on the system. This is the difference between hacker and cracker. Unlike the hacker, a cracker is only really interested in "cracking" the machine/system, and once the feat is accomplished, he/she is generally disinterested and leaves; he/she could be called the tourist of the hacking element.

Another role in the computer underground is that of the "phone phreak." Phone phreaking, usually called just "phreaking," was widely publicized when the exploits of John "Cap'n Crunch" Draper, the "father of phreaking," were publicized in a 1971 Esquire magazine article. The term "phreaking" encompasses several different means of getting around the billing mechanisms of telephone companies. By using these methods, long distance phone calls can be placed without cost. In many cases, the methods also prevent, or at least inhibit, the possibility of calls being traced to their source, thereby helping the phreaker to avoid being caught. Early phreaking methods involved electro-mechanical devices that generated key tones, or altered line voltages in certain ways as to trick the mechanical switches of the phone company into connecting calls without charging. This method of phreaking is generally called "(color) boxing," where the type of box is referred to by a color such as "blue boxing." However the advent of computerized telephone-switching systems largely made these devices obsolete. In order to continue their practice the phreaks have had to learn hacking skills. Phreaking and hacking have just recently merged, because now, the telephone companies are using computers to operate their networks. So, in order to learn more about these computers in relation to the network, phreaks have learned hacking skills, and can now program, and get around inside the machines.

For most members of the computer underground, phreaking is simply a tool that allows them to call long distance without amassing enormous phone bills. Because the two activities are so closely related, with phreakers learning hacking skills and hackers breaking into "telco" computers, reference is usually made to phreak/hacking or p/hackers."

Those who have a deeper and more technically oriented interest in the "telco" (telephone company) are known as phreakers. They, like the hackers discussed earlier, desire to master and explore a system that few outsiders really understand: The phone system is the most interesting, fascinating thing that I know of. There is so much to know. Even phreaks have their own areas of knowledge. There is so much to know that one phreak could know something fairly important and the next phreak not know it at all. The next phreak might know ten things that the first phreak doesn't, though. It all depends upon where and how they get their info. I myself would like to work for the telco, doing something interesting, like programming a switch. Something that isn't slave labor. Something that you enjoy, but have to take risks in order to participate, unless you are lucky enough to work for the telco. To have access to telco things, manuals, and so forth, would be great.

Phreaking involves having the dedication to commit yourself to learning as much about the phone system/network as possible. Since most of this information is not made public, phreaks have to resort to legally questionable means to obtain the knowledge they want. Most members of the underground do not approach the telephone system with such passion. Many hackers are interested in the phone system solely to the extent that they can exploit it’s weaknesses and pursue other goals. In this case, phreaking becomes a means and not a pursuit unto itself. Another individual, one who identifies himself as a hacker, explains: “I know very little about phones . . . I just hack. See, I can't exactly call these numbers direct. A lot of people are in the same boat. In my case, phreaking is a tool, an often used one, but nonetheless a tool.”

In the world of the computer underground, the ability to "phreak a call" is taken for granted. The phone companies allowing the use of the credit cards for billing, has opened the door to wide-scale phreaking. With credit cards, no special knowledge or equipment is required to phreak a call, only valid credit card numbers, known as "codez," are needed to call any location in the world. This method of phreaking is generally called "carding;" it is generally looked on as the lowest form of phreaking, as almost no technical skill is necessary.

Another role in the computer underground is that of the software pirate. Software piracy refers to the unauthorized copying and distribution of copyrighted software. This activity centers around computer bulletin board systems, and parts of the Internet that specialize in "warez." Pirates and phreak/hackers/crackers do not necessarily support the activities of each other, and there is distrust and misunderstanding between the two groups. At least part of this distrust lies in the phreak/hacker perception that piracy is an unskilled activity. A possible exception to this are those pirates that have the programming skills needed to remove copy protection from software. By removing the program code that inhibits duplicate copies from being made, these individuals, who also go by the name "crackers," contribute greatly to the easy distribution of "warez." While p/hackers generally
don't disapprove of piracy as an activity, especially "cracking pirates," they nevertheless tend to avoid pirate bulletin boards and Internet sites, partly because there is little pertinent phreak/hack information contained on them, and partly because of the belief that pirates indiscriminately abuse the telephone network in pursuit of the latest computer game. One hacker illustrates this belief by theorizing that pirates are responsible for a large part of the credit card fraud. The media claims that it is solely hackers who are responsible for losses pertaining to large telecommunication companies and long distance services. This is not the case. Hackers are but a small portion of these losses. The rest are caused by pirates and thieves who sell these codes to people on the street.

Other hackers complain that uploading large programs frequently takes several hours to complete, and it is pirate calls, not the ones placed by "tele-communications enthusiasts" (a popular euphemism for phreakers and hackers) that cost the telephone industry large sums of money. However, not all pirates phreak their calls.

Phreaking is considered "very tacky" among elite pirates, and system operators (Sysops) of pirate bulletin boards discourage phreaked calls because it draws attention to the system when the call is discovered by the telephone company.

For the average computer user, the most feared of the computer underground is that of the computer virus creator. Among the CU, computer viruses are generally referred to as "viri." Computer viruses are in themselves a very specific type of program, but to the novice or low sophistication computer user, which the majority are, they are any program that can take over, damage, or otherwise infiltrate, a computer. Programs that qualify as "trojan horses," "logic bombs," or "worms," are often just called "viruses." A virus is a self-replicating program that is capable of carrying a destructive or otherwise annoying payload, while a "trojan horse" is a program that allows easy access to an already-penetrated system. It can also be used to facilitate a penetration by being tagged to a legitimate program so that when the host computer runs the program, the trojan puts itself in a position to allow the designer easy access. "Logic" or "time bombs" are similar to the trojans, except that they wait for a specific circumstance or time to detonate a harmful payload. Logic bombs are often incorporated into a virus, if it is of the destructive variety, as their destructive payload. The "worm" is the most similar to a virus in that it also replicates, but it is generally designed to infect idle workstations or terminals on a network. Worms tend to exist in memory and are non- permanent, and simply require a reboot to remove them, while the virus resides on disk, where they are permanent until eradicated.

There are two main types of virus writers, people whose main purpose is to create havoc for the computer user doing everything possible to spread their viruses. Then there are the people who aren't interested in spreading their viruses but rather creating them as a mental exercise that involves figuring out better ways to evade detection or further empower their programming skills. The latter will often be composed of software engineers and highly skilled programmers, while the former tends to be a younger age group who are relatively unskilled in comparison. An example of this is a teenage viri writer called "Little Loc," who "wanted to be the most dangerous virus writer in America," and attempted to prove it by writing a virus that became widespread and know as the Satan Bug. On the other hand there are writers like "Screaming Radish," who is a Windows-application developer from Australia, whose purpose in virus development is not destruction, but rather to gain a better understanding of how anti-virus software works. He likes to "reverse-engineer" anti-virus software, taking it apart to study what signatures it scanned for, and what the software excludes from it's scrutiny. Viruses made with that level of sophistication are becoming a type of digital currency in the computer underground, where one can use them to trade for other information.

Mark A. Lugwig, the writer of virus tutorials, had this to say: “It is inevitable that these books will offend some people. In fact, I hope they do. They need to. I am convinced that computer viruses are not evil and that programmers have the right to create them, possess them, and experiment with them. That kind of a stand is going to offend a lot of people, no matter how it is presented. Even a purely technical treatment of viruses, which simply discussed how to write them and provided some examples, would be offensive. The mere thought of a million well-armed hackers out there is enough to drive some bureaucrats mad. These books go beyond a technical treatment, though, to defend the idea that viruses can be useful, interesting, and just plain fun. That is bound to prove even more offensive. Still, the truth is the truth, and it needs to be spoken, even if it is offensive. Morals and ethics cannot be determined by a majority vote, any more than they can be determined by the barrel of a gun or loud mouth. Might does not make right.”

The mass media has tended to sensationalize hacking, while soundly condemning it. But there are other points of view: for example, in many instances the breaching of systems can provide more effective security in the future, so that other (presumably less well-intentioned) elements of the CU are prevented from causing real harm. A good illustration of this was the penetration of British Telecom's electronic mail system in 1984, by Steven Gold and Robert Schifreen, which resulted in a rude message being left in none other than the Duke of Edinburgh's account! This incident attracted enormous publicity and led directly to improved security arrangements for the whole of the Prestel system. Gold and Schifeen were therefore extremely indignant at being treated as criminals - and this illustrates the discrepancy between what the law considers to be criminal behavior and how the CU often perceive themselves.

We might therefore ask ourselves whether, for the sake of balance, a truly democratic society should possess a core of technically gifted but recalcitrant people. Given that more and more information about individuals is now being stored on computers, often without our knowledge or consent, is it not reassuring that some citizens are able to penetrate these databases to find out what is going on. Thus it could be argued that the CU represent one way in which we can help avoid the creation of a more centralized, even totalitarian government. This is one scenario the CU openly entertains. Indeed, we now know that at the time of the Chernobyl nuclear power station disaster in the former Soviet Union, hackers from the Chaos Computer Club released more information to the public about developments than did the West German government itself. All of this information was gained by illegal break-ins carried out in government computer installations.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , ,

Saturday, July 11, 2009

It all starts with the desire to make money from home!

It all starts with the desire to make money from home!

There are no hidden tricks, no risks that you will be taking, and the system will work out to your benefit faster than you imagine. So, what do you say, are you prepared to learn how to make money from home?

Sure, it all sounds too good to be true. But the truth is that you can make money from home, if you are focused and determined to succeed. Many people have made a lucrative business out of Internet marketing, generating handsome profits from a simple home-based business. These people are interested in sharing their personal experience with others, helping them develop their own business as well. There is no better way to learn how to make extra money than by paying attention to those who have already succeeded. They will teach you how to set up an online business, with the necessary steps to build and host your own website.

Apart from providing extensive information where website design and building are concerned, these guys will teach valuable selling strategies, and how to drive targeted traffic. Everyone knows that website visitors are what keep websites alive, with each and every person arriving to the website and generating a new stream of income. Not only will you learn how to make money from home, but you will be presented with the most common mistakes people make, causing their business to fail. You will learn how to avoid such mistakes, and also how to avoid making new ones, which is a very important lesson for anyone looking to start a home-based business.

If you are not sure about the proposed system, then you can always go online and read the testimonials written by satisfied Internet marketers. You will soon discover that the strategies that were taught are highly efficient, allowing one to generate important profits in a short period of time. All you need is the CD presenting you with the most essential lessons on how to make money, creating an online business that is successful above anything else. You might not know too many details about email list marketing, but you will definitely become more interested, one you realize the potential hidden behind this rather extraordinary home-based business.

Your computer represents an important asset, being the portal that will help you make money from home. Forget about it being a debt, and start planning the renovation of your home. Forget about dreaming, and start living today, enjoying all the benefits and profits that come with a successful home-based business. Learn how to make extra money from the best, and turn your life around!


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s another good website to check out: "Bibles New and Used" -
http://www.bibles-new-&-used.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , ,

Friday, July 10, 2009

Setting Up a Microphone in Windows XP

Setting Up a Microphone in Windows XP
Align Center
I'm the first to admit that I'm somewhat multimedia-impaired. I rarely listen to music or watch videos using my computer. However, lately I had to delve into the world of sound because I need to create some demo videos for our new software. The video capture software I'm using is called Camtasia and it's easy to use. The worst part was actually getting the microphone to work, so I could record the narration.

After a number of false starts, I did an Internet search. As it turns out I'm not alone; microphone problems seem to run rampant. Ideally, you just plug in the microphone and it just works. The reality is that things can go wrong in a number of places. I actually tried out three microphones, most of which I had inherited when a friend cleaned out a box of old hardware. Here's what I learned the hard way.

1. Plug the microphone into the correct spot. It's not as easy as you might think. Many computers have more than one plug. My computer has two microphone plugs, one on the front and one on the back. Often the connectors are pink and the plug is pink too, which makes it easier to figure out which plug is the right one. (The icons on the case are often cryptic at best.) The connector goes to your sound card, which may be built into your computer's motherboard or a separate card.

2. Test the microphone. Choose Start|Programs|Accessories|Entertainment and open the Windows Sound Recorder. Click the red Record button and speak into the microphone. If it's working, you should see a wave form and be able to play it back.

3. Make sure your volume or the microphone aren't muted or low. Choose Start|Setting Control Panel|Sounds and Audio. In the Audio tab, click the Volume buttons under Sound Playback and Sound Recording. Another way to access the playback volume is by choosing Start|Programs|Accessories| Entertainment|Volume Control.

4. Adjust settings in your software. After you have the hardware set, you need to tweak the settings in the software you plan to use to record your audio. In my case, that meant adjusting Camtasia settings. If you were using a speech recognition program like Dragon Naturally Speaking, you would check the settings in that program.

When you run into problems, you need to keep testing and tweaking settings until you get it just right. Then go back and write down your settings somewhere so you don't forget them.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s another good website to check out: "Bibles New and Used" -
http://www.bibles-new-&-used.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , , , ,

Wednesday, July 08, 2009

Three Amazing Secrets My Cat Taught Me About How To Run Successful E-Businesses

Three Amazing Secrets My Cat Taught Me About How To Run
Successful E-Businesses!

I'm all in favor of successful e-businesses as much as the next guy!

But I never expected to be taught about how successful e-businesses are run . . . by my cat! But if you got to know my cat, Lolita, you'd understand why she could be a source of profitable information.

For example, Lolita loves to lie on my fax machine. Probably because it's warm. Though, I'd like to think it's because she likes to be close to me when I'm working on my computer. Anyway, Lolita squirms a lot to get comfortable. When she does, she hits buttons on the fax machine.

Occasionally she sends an undecipherable message into cyberspace. If you've ever gotten a confusing fax from an unknown sender . . . well, you may have already met Lolita!

What's remarkable about her normal cat behavior is how she can be so instructive about running successful e-businesses. In fact, here are three secrets she's managed to convey to me just by being a cat.

1. Amazing persistence. When she's hungry, she's relentless about getting her food in a timely fashion. I recall waking up one night recently about 2 AM to loud meowing. Lolita was sitting on my stomach, tapping my chest with her paw. I woke up bewildered. Then I realized the only thing that could provoke her at this hour was food. Sure enough, her plate was empty.

2. Steady focus. Have you ever seen a cat pursuing a bug or some other critter? Nothing distracts them from their mission . . . to grab that object of their focus. Lolita is no different. She cannot be dissuaded from her commitment no matter how hard I try to shoo her away. She never loses sight of her objective, even if it's from another room. When the moment's right, she's back at it.

3. Showing appreciation. My cat, Lolita, is the most loving animal when she's gotten something she wanted. She sidles up to me and rubs me and purrs loudly. I know she's been fulfilled and likes what I've done for her. Rewarding customers for their loyalty is no different. It's a guarantee that they'll come back.

Look, it takes a lot more than my cat's secrets to run successful e-businesses. But her behaviors aren't a bad beginning.

For instance, the hardest part of running successful e-businesses is not the e-business concept. Fortunately, there are plenty of exciting turnkey business plans that take away the need for programming expertise. In other words, it's possible to be up and running with successful e-businesses in a matter of minutes.

That's the easy part. The hard part is to persistently master sales and marketing techniques over a period of time. It requires steady focus on the goal of generating sales. And when sales occur, you have to be ready to coddle your customers to make sure they come back for more.

If you're lucky enough to have a smart cat like mine, maybe you'll pay better attention to your pet's recommendations for successful e-business!


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , , ,

Monday, July 06, 2009

Streetcars in New Orleans

Streetcars in New Orleans

Streetcars in New Orleans have been an integral part of the city's public transportation network since the first half of the 19th century. The longest of New Orleans' streetcar lines, the St. Charles Avenue Streetcar, is the oldest continuously operating street railway system in the world, according to the American Society of Mechanical Engineers. Today, the streetcars are operated by the New Orleans Regional Transit Authority (RTA).

There are currently three operating streetcar lines in New Orleans: The St. Charles Avenue Line, the Riverfront Line, and the Canal Street Line. The St. Charles Avenue Line is the only line that has operated continuously throughout New Orleans' streetcar history (though service was interrupted after Hurricane Katrina in August 2005 and resumed only in part in December 2006. All other lines were replaced by bus service in the period from the late 1940s to the early 1960s; preservationists were unable to save the streetcars on Canal Street, but were able to convince the city government to protect the St. Charles Avenue Line by granting it historic landmark status. In the later 20th century, trends began to favor rail transit again. A short Riverfront Line started service in 1988, and service returned to Canal Street in 2004, 40 years after it had been shut down.

The wide destruction wrought on the city by Hurricane Katrina and subsequent floods from the levee breaches in August 2005 knocked all three lines out of operation and damaged many of the streetcars. Service on a portion of the Canal Street line was restored in December of that year, with the remainder of the line and the Riverfront line returning to service in early 2006. On December 23, 2007, the Regional Transit Authority (RTA) extended service from Napoleon Avenue to the end of historic St. Charles Avenue. On June 22, 2008 service was restored to the end of the line at South Carrollton Avenue & South Claiborne Avenue.

The standard fare for all three lines is $1.25, with discounts for senior citizens. Passengers with disabilities and passengers two and under are admitted free. Transfers to other routes are available for $0.25.

In 1902, there was protest when the Louisiana legislature mandated that public transportation must enforce racial segregation. At first this was objected to by both white and black riders as an inconvenience, and by the streetcar companies on grounds of both added expense and the difficulties of determining the racial background of some New Orleanians.

In 1929, there was a widespread strike by transit workers demanding better pay which was widely supported by much of the public. Sandwiches on baguettes were given to the "poor boys" on strike, said to be the origin of the local name of "po' boy" sandwiches. The same year, the last of the 4 ft 8½ in (1,440 mm) (standard gauge) tracks were converted to 5 ft 2½ Inch (1588 mm) to match the rest of the streetcar lines.

After World War II, as with much of the United States, many streetcar lines were replaced with buses, either internal combustion (gasoline/diesel) or electric (trolley coaches).

In December 2006, NORTA received a $46 million grant to help pay for the car restoration efforts.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , , ,

Friday, July 03, 2009

Car Financing

Car Financing

When financing a classic car purchase, your best option is to choose a specialty lender that deals with classic cars and collector cars. You will likely find a better interest rate, longer loan terms, and go through less work than if you choose a typical lender. This article will show you how to finance a classic car purchase, and what pitfalls to look out for.

The main reason to shop around specialty car loan lenders is that you will have to go through less hassle. These lenders deal with classic and collector car loans all the time, and they can help guide you through the purchase. Standard lenders sometimes use the Kelley Blue Book or NADA price guides for classic cars and that just won’t work, especially for hot rods and other customs or special editions. Having original parts and other unique options on a collector car can add value, and specialty lenders understand this. Specialty lenders can also extend the loan term, sometimes up to 12 to 15 years depending on the amount being requested. Typical auto lenders generally go up to five years.

Before you even start the loan process, you will want to check your credit score. If your FICA score is around 600 or lower, you may have a difficult time getting a loan. Anything in the 600’s and you may qualify, but you may have a higher interest rate. Anything above 700 and you should have no problems securing a loan, plus you will get the added benefit of having a lower interest rate. Any lender will require 20 percent down on a classic car loan, and usually 30 percent for a hot rod.

Most specialty lenders do not require you to have a car ready for purchase before applying for the loan. You generally have 30 to 60 days after being approved to find a car, otherwise you may need to go through the approval process again. When determining the loan amount, do not forget about the hidden costs of purchasing a collector car. Odds are, especially if you are looking for a certain model, color, option, etc. that you will not find it in your area. The Internet can be a great tool in helping you find the exact car you are looking for, but that car is probably in another state or region, requiring travel and transportation. You may want to travel to see the car, which will cost money, and you will need to transport it back if you do not want to drive it. Depending on how far away the car is, driving it may not be an option due to strict insurance restrictions. All this may be able to be rolled into the loan amount. Talk to your lender about these options.

Many lenders require an inspection of the car by a qualified inspector. The lender will be able to help with this, since they probably have certain inspectors they require you to use. Many buyers choose to have their car inspected before purchase anyhow, so make sure you talk to the lender before deciding on an inspection company. If the inspector you choose is not certified by your lender, you may be required to purchase another inspection, costing hundreds of dollars more.

Even if you have the money saved to buy a collector car outright, it may be in your best interest to pursue a classic car loan. Over the last 15 to 20 years, the value of collector and classic cars have gone up sharply, sometimes 10 percent or more a year. Considering a classic car loan is probably 6 percent or so, this makes borrowing the money an investment. But be careful during these economic down times and do your research. Rare and original models are still going up in value, but clones and other mid-models are not rising in value as fast as they once did. This could change at anytime though.

There is no better feeling than driving around in your new classic car. Hopefully this article will help you in securing a low interest loan, and speed up the process so you can drive around town in your new ride, rather than dealing with headaches you may have by going through a typical lending company.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: , , , , , , , ,

Wednesday, July 01, 2009

Dogs too have unique personalities

Dogs too have unique personalities

Their personality can be checked at a very young age through a test. When you know your dog's personality it becomes easier for you to train it.

While it is not true that a puppy test allows to you buy a perfect dog, it can definitely help you in bringing home a mentally stable and easy going one. Nevertheless, the experience and training techniques are far more important in the mental and physical development of the dog.

There are certain conditions of the puppy test and we shall take a look at them.

- The test has to be performed in a quiet place which does not have any external distractions for the dog. The place should be unknown to the dog.

- The test should be conducted on the puppy when it is between 5 to 7 weeks old. At this age, the puppies are not fully attached to the humans, however their personalities are already built.

- The test should be performed by a person who is a stranger to the puppy, which will ensure that the results are unbiased and trustworthy.

There are several tests that exist for testing the dog's personality. Let's take a look at one such test. This test is known as the Campbell test. This test marks puppies for 5 different criteria.

- Social attraction

- Ability to follow

- Response to obligation

- Social domination

- Acceptance to be lifted

To test social attraction, the dog's reaction is checked by the testing person by sitting at a distance from it. It is checked if the dog approaches the person, if yes then how does he keep his tail, high or low? It is checked if the dog explores his surroundings or he simply tries to run away. In order to check the dog's ability to follow, the tester will simply put a puppy next to him and walk a little, and then check if the dog follows him or not. The other things to be checked are whether the dog jumps while walking or tries to bite the person's ankles. Does the dog keep his distance while following? Or does he simply wander off?

To check how the dog responds to the obligation, he is put on his back on the ground and a hand is placed over his chest. It is checked whether the dog violently tries to bite the hand and get away, or shows initial protest and then calms down, or whether he simply lays quiet and tries to lick the person's hand. Be sure to do this on a soft surface or you may injure the dog's back.

During social domination testing, the tester will merely sit close to the puppy and hit it gently. The clues will come from whether they try to bite, climb upon a person's body, or just try to run away from the tester.

Finally, for testing how the puppy reacts to being lifted, the dog is lifted from the ground by keeping the arms under his chest so that the puppy doesn't see the person. Here too, it is tested if the dog violently tries to bite the hand and get away, or shows initial protest and then calms down, or whether he remains quiet and licks the person's hand.

The combination score of all the areas determines the overall personality of your dog. If you are new to keeping a dog, you should try bringing in a dog who is not very dominant, as you may find it difficult to handle it.


Copyright 2011 by Preston Smith, Walker Enterprises/Silver Dollar Press. All Rights Reserved.

Here’s a good website to check out: “Studio Quality Portraits For Less” - http://studio-quality-portraits-for-less.weblodge.net

Here’s another good website to check out: “Green Cleaning Products” - http://green-cleaning-products.weblodge.net

Here’s another good website to check out: “How To Adjust & Repair Your Sewing Machine” - http://www.silver-dollar.zoomshare.com

Here’s a good Forum to check out: http://dachshund-forum.forumotion.com

Labels: