Changing the list of programs
When you install a program then the program (which is good) will of course
add to Unsintall (in the Add / Remove Programs). But when you
have uninstall the program and there are still at the entry
Add / Remove Programs You can be manually removed.
Entrance to the key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Uninstall
After that you can delete the entry remaining.
W32.Koobface.D
Symantec Security Response
http://www.symantec.com/business/security_response/index.jspW32.Koobface.D
Risk Level 1: Very Low
SUMMARY
W32.Koobface.D is a worm that spreads through social networking sites. It also sends confidential information to a remote location.Protection
- Initial Rapid Release version August 7, 2009 revision 051
- Latest Rapid Release version August 7, 2009 revision 051
- Initial Daily Certified version August 8, 2009 revision 003
- Latest Daily Certified version August 8, 2009 revision 003
- Initial Weekly Certified release date August 12, 2009
Threat Assessment
Wild
- Wild Level: Low
- Number of Infections: 0 - 49
- Number of Sites: 0 - 2
- Geographical Distribution: Low
- Threat Containment: Easy
- Removal: Easy
Damage
- Damage Level: Low
- Payload: Spreads through social networking sites.
- Releases Confidential Info: Gathers authentication cookies and sends them to a remote location.
Distribution
- Distribution Level: Low
TECHNICAL DETAILS
This threat has been renamed from W32.Koobface.V to W32.Koobface.DOnce executed, the worm copies itself as the following file:
%Windir%\ld12.exe
It drops the following nonmalicious file as an infection marker:
%Windir%\prxid93ps.dat
The worm creates the following registry entry, so that it runs every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"sysldtra
y" = "%Windir%\ld12.exe"
It then deletes the following registry entries:
- HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\"(Default)" = ""
- HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.Current\"(Default)" = "%SystemRoot%\media\Windows XP Start.wav"
- HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.Default\"(Default)" = "%SystemRoot%\media\Windows XP Start.wav"
The worm checks for an internet connection by trying to connect to google.com.
It then attempts to connect to the following URLs:
- [http://]mymegadomain03072009.com/achche[REMOVED]
- [http://]rjulythree.com/achche[REMOVED]
- [http://]u15jul.com/achche[REMOVED]
- [http://]umidsummer.com/achche[REMOVED]
- [http://]upr0306.com/achche[REMOVED]
- [http://]uthreejuly.com/achche[REMOVED]
- [http://]www.google.com[REMOVED]
- [http://]web.reg.md/1/p.jpg|193854730[REMOVED]
- [http://]web.reg.md/1/prx[REMOVED]
- [http://]web.reg.md/1/pp.1[REMOVED]
It then scans for cookies in the Internet Explorer cache. It then connects to the following URL:
[http://]upr0306.com/ld/gen[REMOVED]
It sends information about authentication cookies for the following social networking sites:
- bebo.com
- facebook.com
- hi5.com
- myspace.com
- netlog.com
- tagged.com
- twitter.com
The worm then receives the location of further updates and other files to download after sending the confidential authentication information.
It downloads other files and updates from the following URLs:
- [http://]web.reg.md/1/p.jpg|193854730[REMOVED]
- [http://]web.reg.md/1/prx[REMOVED]
- [http://]web.reg.md/1/pp.1[REMOVED]
Recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":- Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
- Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
- Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
- Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
- Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
- Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
- If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
- Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
- Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
- Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
- Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
- If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.
- For further information on the terms used in this document, please refer to the Security Response glossary.
REMOVAL
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.- Disable System Restore (Windows Me/XP).
- Update the virus definitions.
- Run a full system scan.
- Delete any values added to the registry.
For specific details on each of these steps, read the following instructions.
1. To disable System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.
Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.
Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.
For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
- How to disable or enable Windows Me System Restore
- How to turn off or turn on Windows XP System Restore
Note: When you are completely finished with the removal procedure and are satisfied that the threat has been removed, reenable System Restore by following the instructions in the aforementioned documents.
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article: Antivirus Tools Cannot Clean Infected Files in the _Restore Folder (Article ID: Q263455).
2. To update the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
- Running LiveUpdate, which is the easiest way to obtain virus definitions.
If you use Norton AntiVirus 2006, Symantec AntiVirus Corporate Edition 10.0, or newer products, LiveUpdate definitions are updated daily. These products include newer technology.
If you use Norton AntiVirus 2005, Symantec AntiVirus Corporate Edition 9.0, or earlier products, LiveUpdate definitions are updated weekly. The exception is major outbreaks, when definitions are updated more often.
- Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted daily. You should download the definitions from the Symantec Security Response Web site and manually install them.
The latest Intelligent Updater virus definitions can be obtained here: Intelligent Updater virus definitions. For detailed instructions read the document: How to update virus definition files using the Intelligent Updater.
3. To run a full system scan
- Start your Symantec antivirus program and make sure that it is configured to scan all the files.
For Norton AntiVirus consumer products: Read the document: How to configure Norton AntiVirus to scan all files.
For Symantec AntiVirus Enterprise products: Read the document: How to verify that a Symantec Corporate antivirus product is set to scan all files.
- Run a full system scan.
- If any files are detected, follow the instructions displayed by your antivirus program.
After the files are deleted, restart the computer in Normal mode and proceed with the next section.
Warning messages may be displayed when the computer is restarted, since the threat may not be fully removed at this point. You can ignore these messages and click OK. These messages will not appear when the computer is restarted after the removal instructions have been fully completed. The messages displayed may be similar to the following:
Title: [FILE PATH]
Message body: Windows cannot find [FILE NAME]. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.
4. To delete the value from the registry
Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only. For instructions refer to the document: How to make a backup of the Windows registry.
- Click Start > Run.
- Type regedit
- Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. Security Response has developed a tool to resolve this problem. Download and run this tool, and then continue with the removal.
- Navigate to and delete the following registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"sysldtray" = "%Windir%\ld12.exe"
- Restore the following registry entries to their previous values, if required:
- HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\"(Default)" = ""
- HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.Current\"(Default)" = "%SystemRoot%\media\Windows XP Start.wav"
- HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.Default\"(Default)" = "%SystemRoot%\media\Windows XP Start.wav"
- Exit the Registry Editor.
Note: If the risk creates or modifies registry subkeys or entries under HKEY_CURRENT_USER, it is possible that it created them for every user on the compromised computer. To ensure that all registry subkeys or entries are removed or restored, log on using each user account and check for any HKEY_CURRENT_USER items listed above.
W32.SillyFDC.BCQ
Symantec Security Response
http://www.symantec.com/security_response/index.jspW32.SillyFDC.BCQ
Risk Level 1: Very Low
SUMMARY
W32.SillyFDC.BCQ is a worm that spreads by copying itself to removable drives. It may also spread through file sharing programs.Protection
- Initial Rapid Release version August 7, 2009 revision 001
- Latest Rapid Release version August 7, 2009 revision 001
- Initial Daily Certified version August 7, 2009 revision 007
- Latest Daily Certified version August 7, 2009 revision 007
- Initial Weekly Certified release date August 12, 2009
Threat Assessment
Wild
- Wild Level: Low
- Number of Infections: 0 - 49
- Number of Sites: 0 - 2
- Geographical Distribution: Low
- Threat Containment: Easy
- Removal: Easy
Damage
- Damage Level: Low
Distribution
- Distribution Level: Medium
- Target of Infection: Removable drives
TECHNICAL DETAILS
When executed, the worm copies itself as the following file:%SystemDrive%\RECYCLER\[SID]\sysdate.exe
It then creates the following registry entry so that it runs every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"Taskman" = "%SystemDrive%\RECYCLER\[SID]\sysdate.exe"
The worm spreads by copying itself to all removable drives as the following file:
%DriveLetter%\temp\winsetup.exe
It also copies the following file so that it runs when the removable devices are connected to another computer:
%DriveLetter%\autorun.inf
The worm may also spread though file sharing programs.
Recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":- Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
- Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
- Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
- Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
- Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
- Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
- If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
- Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
- Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
- Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
- Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
- If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.
- For further information on the terms used in this document, please refer to the Security Response glossary.
REMOVAL
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.- Disable System Restore (Windows Me/XP).
- Update the virus definitions.
- Run a full system scan.
- Delete any values added to the registry.
For specific details on each of these steps, read the following instructions.
1. To disable System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.
Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.
Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.
For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
- How to disable or enable Windows Me System Restore
- How to turn off or turn on Windows XP System Restore
Note: When you are completely finished with the removal procedure and are satisfied that the threat has been removed, reenable System Restore by following the instructions in the aforementioned documents.
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article: Antivirus Tools Cannot Clean Infected Files in the _Restore Folder (Article ID: Q263455).
2. To update the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
- Running LiveUpdate, which is the easiest way to obtain virus definitions.
If you use Norton AntiVirus 2006, Symantec AntiVirus Corporate Edition 10.0, or newer products, LiveUpdate definitions are updated daily. These products include newer technology.
If you use Norton AntiVirus 2005, Symantec AntiVirus Corporate Edition 9.0, or earlier products, LiveUpdate definitions are updated weekly. The exception is major outbreaks, when definitions are updated more often.
- Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted daily. You should download the definitions from the Symantec Security Response Web site and manually install them.
The latest Intelligent Updater virus definitions can be obtained here: Intelligent Updater virus definitions. For detailed instructions read the document: How to update virus definition files using the Intelligent Updater.
3. To run a full system scan
- Start your Symantec antivirus program and make sure that it is configured to scan all the files.
For Norton AntiVirus consumer products: Read the document: How to configure Norton AntiVirus to scan all files.
For Symantec AntiVirus Enterprise products: Read the document: How to verify that a Symantec Corporate antivirus product is set to scan all files.
- Run a full system scan.
- If any files are detected, follow the instructions displayed by your antivirus program.
After the files are deleted, restart the computer in Normal mode and proceed with the next section.
Warning messages may be displayed when the computer is restarted, since the threat may not be fully removed at this point. You can ignore these messages and click OK. These messages will not appear when the computer is restarted after the removal instructions have been fully completed. The messages displayed may be similar to the following:
Title: [FILE PATH]
Message body: Windows cannot find [FILE NAME]. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.
4. To delete the value from the registry
Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only. For instructions refer to the document: How to make a backup of the Windows registry.
- Click Start > Run.
- Type regedit
- Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. Security Response has developed a tool to resolve this problem. Download and run this tool, and then continue with the removal.
- Navigate to and delete the following registry entry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"Taskman" = "%SystemDrive%\RECYCLER\[SID]\sysdate.exe"
- Exit the Registry Editor.
Note: If the risk creates or modifies registry subkeys or entries under HKEY_CURRENT_USER, it is possible that it created them for every user on the compromised computer. To ensure that all registry subkeys or entries are removed or restored, log on using each user account and check for any HKEY_CURRENT_USER items listed above.
Using Mozilla Firefox
Zoom in (Ctrl +)
Zoom out (Ctrl -)
Reset Zoom (Ctrl 0)
Open new tab (Ctrl T)
Open link in new tab (Middle click on link)
Close a tab (Ctrl W)
Reopen a close tab (Ctrl Shift T)
Add bookmark with a single click (Use Star Button at right address bar)
Move cursor to location bar (Ctrl L)
Move cursor to search box (Ctrl K)
Scroll down the page (Space Bar)
Scroll up the page (Shift Space Bar)
Refresh the page (Ctrl R)
Back previous page (Ctrl Left Arrow)
Forward page (Ctrl Right Arrow)
Quick Find Text ( Ctrl F)
Quick Bookmark (Ctrl D)
If you need the latest updated mozila, download the browser here. 100% Free
Adsense Strategies for your website
After join with adsense you will start to promote you site so others will come and activity there. Some activity will make some revenue if they click our ads. So when you design your site with adsense, make sure to choose which one is the best and the most suitable for using.
Here some tips for you
When using adsense:
1. Using the right ad block sizes
Make your ads not look like ads. Blends and make it size looks like a content so people don't know there is an ads there. With Google Adsense you can choose and use ad block size. Google provide you some ad size, leaderboard, skycraper, rectangle, Which one do you think is the best?
2. Good Placement
Place your ads so people can see and cares of your ads. Placing your ads at the bottom of post area will get more attention or making ads border have the same color of the background make more looks like a content.
But read the Placement ads TOS first.
If you are new with adsense you should read this
There is a lot of publishers has banned from Google Adsense. It's happen because they do not understand about Google's TOS (Term of Service). Please make sure to read it before you step away. Once you have banned from Google Adsense, you'll be unable join with the same account again forever. How pitty ..
So make sure to understand first.
Here is some tips with Adsense:
1. Do not click your own ads
Do not click your own ads. Not even once to try it. Remember Google is a Super multi billion company. There is no stupid guy work there. They know all about trick that try to cheat them. So don't even try to click your own ads.
But some people say, hey.. i click my own ads and look it works. Yes of course it works. But later you'll received Google's love letter and said, "You're banned, fraud click". And at that time you'll change your mind. So once again, do not click your own ads.
2. Inviting others to click ads
Do not invite others to click your own ads. You may say, i have a good website, i have an adsense there, come on click my ads.
What i say brothers.., "Google Knows", and what happen? "Banned"
Google is watching you. Ip, place, visitors number, they even know your place. If they give free service like Google earth, to see from satelite, what we know if they could see where you are standing now?
Just don't invite others to click your own ads.
3. Use the match color palettes
Use match colors between your ads and your site will effect your revenue.
4. Bad ads placement
Place your ads where people could see it. Do not put your ads in the wrong place. Try to make a riset where is the best to place your ads.
For me, the most highly click place is under the post, and vertical ads on the side bar, and leaderboard on the top or bottom page.
Keep the place safe according to Adsense TOS, and don't put it which place that makes an accidental click. We will review about accidentaly click later.
5. Use Channels
Channel is a statistic service for Adsense, so you know where is the right place to put the ads. Let the statistic tell you which one is better for you.
Channel also as a report about click numbers, page impresssion, specific revenue of your ads site. Use channel for details ads information.
6. Use the right ad blocks
So many visitors on the web is carefully about this, and they will not click the ads. Make sure your ads is looks blend with your site so they do not know there is an ads.
Using the right ad blocks will increase your revenue.
How to choose a domain name
Free web sites
Budget hosting
Web templates
Basic web design guidelines
Web design
Website translation and regionalization
Graphic Formats
Marketing tips
List archives by title
How can I list my archives by title?
- You can add in other Blogger tags to this bare-bones version, if you want. For instance, you might add the
tags if you want to group the titles by date.<$BlogDateHeaderDate$> - As with any template modifications, you should be sure to save a backup copy of your template before you start. Just copy and paste all your code to a text file on your hard drive, so you'll have it there as a replacement in case anything goes wrong.
- http://www.google.com/support/blogger/bin/answer.py?answer=42209&cbid=p2a19ukuvzui&src=cb&lev=answer
Adding a site
Adding a site
- Sign into Google Webmaster Tools with your Google Account.
- Click Add a site, and type the URL of the site you want to add. Make sure you type the entire URL, such as http://www.example.com/
- Click Continue. The Site verification page opens.
- (Optional) In the Name box, type a name for your site (for example, My Blog).
- Select the verification method you want.
- Meta tag: We will ask you to add a meta tag with a unique value to your site's home page. This is the easiest solution if editing your home page's HTML is easier than uploading new files. In addition, this solution lets you easily verify sites you've created using Google Sites.
- HTML file: We will ask you to create a file with a specific name and upload it to a specific directory on your webserver. The file can be empty—Google cares only about the file's location, not about its content.
What kind of sites can I add?
- example.com
- www.example.com
- bar.example.com
- foo.bar.example.com
- www.example.com/foo
- www.example.com/foo/bar
- foo.bar.example.com/catalog/dresses
- http://www.example.com
- http://www.example.com/france
- http://www.example.com/ireland
- http://www.example.com/spain
Promoting Your Blog
Promoting Your Blog
Learn How to Improve the Google Ranking of Your Website!
We Give You Specific Techniques (with examples!) on how to Optimize Your Site
Download the Guide Now to Learn:
- How to Create Effective Meta Tags – Easy to read step by step guide!
- The Best Ways to Structure Your URLS and Navigation - For maximum SEO impact!
- How to Create High Ranking Content - Tips to improve your keyword density!
- How to Promote Your Site & Build Links - Best practice advice from Google!
Use Keyboard Posting
- control + b = Bold
- control + i = Italic
- control + l = Blockquote (when in HTML-mode only)
- control + z = Undo
- control + y = Redo
- control + shift + a = Link
- control + shift + p = Preview
- control + d = Save as Draft
- control + p = Publish Post
- control + s = Autosave and keep editing
- control + g = Indic transliteration
How To Make Your Site Social Media Friendly
- Crawlable content
- Site organization
- Internal links
- Keyword usage - content optimization
- Code/HTML optimization
- Inbound links from external web sites
- Fresh content - To play the search and social media game, a web site must be in the content publishing business. Search engines and participants of the social web respond favorably to the signals created from frequent updates. Participation in off site social channels can be brought into the corporate web site through RSS or widgets providing web site visitors access to additional forms of information and interaction with the company.
- Social content - Not all of a company’s social web participation needs to happen offsite with third party tools. The addition of a blog, reviews, forum or even a social network to the company web site can provide intersted consumers opportunities to interact with other brand fans as well as the company.
- Easy to share - Besides the ability to contribute to conversations happening on a corporate web site, there’s a tremendous opportunity and benefit to making it easy for site visitors to share that content with others. Many sites offer “share this” options that make it easy for readers to submit the page being viewed to popular social bookmarking and social news web sites such as Digg, Delicious and StumbleUpon. Sharing options for Facebook, Twitter and email are also popular.Making it easy for web site visitors to share interesting content (web pages, video, images) facilitates the word of mouth recommendations people make in real life, except when done online, they become searchable assets.
Atom
Atom - Physical Science - The Structure of an Atom
The atom is a basic unit of matter consisting
of a dense, central nucleus surrounded by
a cloud of negatively charged electrons.
The atomic nucleus contains a mix of positively
charged protons and electrically neutral
neutrons (except in the case of hydrogen-1,
which is the only stable nuclide with no neutron).
The electrons of an atom are bound to the nucleus
by the electromagnetic force.
Likewise, a group of atoms can remain bound to
each other, forming a molecule.
An atom containing an equal number of protons and
electrons is electrically neutral,
otherwise it has a positive or negative charge
and is an ion.
An atom is classified according to the number
of protons and neutrons in its nucleus:
the number of protons determines the chemical element,
and the number of neutrons determine the isotope
of the element.
The name atom comes from the Greek ἄτομος/átomos,
α-τεμνω, which means uncuttable, something that
cannot be divided further.
The concept of an atom as an indivisible component
of matter was first proposed by
early Indian and Greek philosophers. In the 17th
and 18th centuries, chemists provided a physical
basis for this idea by showing that certain
substances could not be further broken down
by chemical methods.
During the late 19th and early 20th centuries,
physicists discovered subatomic components and
structure inside the atom,
thereby demonstrating that the 'atom'
was not indivisible.
The principles of quantum mechanics were used
to successfully model the atom.
Relative to everyday experience, atoms are
minuscule objects with proportionately
tiny masses. Atoms can only be observed
individually using special instruments
such as the scanning tunneling microscope.
Over 99.9% of an atom's mass is
concentrated in the nucleus, with protons
and neutrons having roughly equal mass.
Each element has at least one isotope with
unstable nuclei that can undergo
radioactive decay. This can result in a
transmutation that changes the number of
protons or neutrons in a nucleus. Electrons
that are bound to atoms
possess a set of stable energy levels,
or orbitals, and can undergo transitions
between them by absorbing or emitting
photons that match the energy differences
between the levels. The electrons determine
the chemical properties of an element,
and strongly influence an atom's magnetic
properties.
Web Hosting Scams
Maximizing AdSense Revenues via Up-Selling
Mesothelioma
Mesothelioma is a form of cancer that is almost always caused by exposure to asbestos. In this disease, malignant cells develop in the mesothelium, a protective lining that covers most of the body's internal organs. Its most common site is the pleura (outer lining of the lungs and internal chest wall), but it may also occur in the peritoneum (the lining of the abdominal cavity), the heart, the pericardium (a sac that surrounds the heart) or tunica vaginalis.
Most people who develop mesothelioma have worked on jobs where they inhaled asbestos particles, or they have been exposed to asbestos dust and fiber in other ways. Washing the clothes of a family member who worked with asbestos can also put a person at risk for developing mesothelioma. Unlike lung cancer, there is no association between mesothelioma and smoking, but smoking greatly increases risk of other asbestos-induced cancer. Compensation via asbestos funds or lawsuits is an important issue in mesothelioma.
The symptoms of mesothelioma include shortness of breath due to pleural effusion (fluid between the lung and the chest wall) or chest wall pain, and general symptoms such as weight loss. The diagnosis may be suspected with chest X-ray and CT scan, and is confirmed with a biopsy (tissue sample) and microscopic examination. A thoracoscopy (inserting a tube with a camera into the chest) can be used to take biopsies. It allows the introduction of substances such as talc to obliterate the pleural space (called pleurodesis), which prevents more fluid from accumulating and pressing on the lung. Despite treatment with chemotherapy, radiation therapy or sometimes surgery, the disease carries a poor prognosis. Research about screening tests for the early detection of mesothelioma is ongoing.
Signs and symptoms
Symptoms of mesothelioma may not appear until 20 to 50 years after exposure to asbestos. Shortness of breath, cough, and pain in the chest due to an accumulation of fluid in the pleural space are often symptoms of pleural mesothelioma.
Symptoms of peritoneal mesothelioma include weight loss and cachexia, abdominal swelling and pain due to ascites (a buildup of fluid in the abdominal cavity). Other symptoms of peritoneal mesothelioma may include bowel obstruction, blood clotting abnormalities, anemia, and fever. If the cancer has spread beyond the mesothelium to other parts of the body, symptoms may include pain, trouble swallowing, or swelling of the neck or face.
These symptoms may be caused by mesothelioma or by other, less serious conditions.
Mesothelioma that affects the pleura can cause these signs and symptoms:
> Chest wall pain
> Pleural effusion, or fluid surrounding the lung
> Shortness of breath
> Fatigue or anemia
> Wheezing, hoarseness, or cough
> Blood in the sputum (fluid) coughed up (hemoptysis)
In severe cases, the person may have many tumor masses. The individual may develop a pneumothorax, or collapse of the lung. The disease may metastasize, or spread, to other parts of the body.
Tumors that affect the abdominal cavity often do not cause symptoms until they are at a late stage. Symptoms include:
> Abdominal pain
> Ascites, or an abnormal buildup of fluid in the abdomen
> A mass in the abdomen
> Problems with bowel function
> Weight loss
In severe cases of the disease, the following signs and symptoms may be present:
> Blood clots in the veins, which may cause thrombophlebitis
> Disseminated intravascular coagulation, a disorder causing severe bleeding in many body organs
> Jaundice, or yellowing of the eyes and skin
> Low blood sugar level
> Pleural effusion
> Pulmonary emboli, or blood clots in the arteries of the lungs
> Severe ascites
A mesothelioma does not usually spread to the bone, brain, or adrenal glands. Pleural tumors are usually found only on one side of the lungs.
Diagnosis
Diagnosing mesothelioma is often difficult, because the symptoms are similar to those of a number of other conditions. Diagnosis begins with a review of the patient's medical history. A history of exposure to asbestos may increase clinical suspicion for mesothelioma. A physical examination is performed, followed by chest X-ray and often lung function tests. The X-ray may reveal pleural thickening commonly seen after asbestos exposure and increases suspicion of mesothelioma. A CT (or CAT) scan or an MRI is usually performed. If a large amount of fluid is present, abnormal cells may be detected by cytology if this fluid is aspirated with a syringe. For pleural fluid this is done by a pleural tap or chest drain, in ascites with an paracentesis or ascitic drain and in a pericardial effusion with pericardiocentesis. While absence of malignant cells on cytology does not completely exclude mesothelioma, it makes it much more unlikely, especially if an alternative diagnosis can be made (e.g. tuberculosis, heart failure).
If cytology is positive or a plaque is regarded as suspicious, a biopsy is needed to confirm a diagnosis of mesothelioma. A doctor removes a sample of tissue for examination under a microscope by a pathologist. A biopsy may be done in different ways, depending on where the abnormal area is located. If the cancer is in the chest, the doctor may perform a thoracoscopy. In this procedure, the doctor makes a small cut through the chest wall and puts a thin, lighted tube called a thoracoscope into the chest between two ribs. Thoracoscopy allows the doctor to look inside the chest and obtain tissue samples.
If the cancer is in the abdomen, the doctor may perform a laparoscopy. To obtain tissue for examination, the doctor makes a small incision in the abdomen and inserts a special instrument into the abdominal cavity. If these procedures do not yield enough tissue, more extensive diagnostic surgery may be necessary.
CT scan of a patient with mesothelioma, coronal section (the section follows the plane that divides the body in a front and a back half). The mesothelioma is indicated by yellow arrows, the central pleural effusion (fluid collection) is marked with a yellow star.
Red numbers: (1) right lung, (2) spine, (3) left lung, (4) ribs, (5) descending part of the aorta, (6) spleen, (7) left kidney, (8) right kidney, (9) liver.