" href="https://www.crgeng.com/uk-company-seriously-considering-gps-tracking-devices-in-school-uniforms-5/" rel="bookmark">
UK company “seriously considering” GPS tracking devices in school uniforms

Saturday, August 25, 2007

The leading supplier of school uniforms in the United Kingdom, Lancashire-based manufacturer Trutex, has announced it is “seriously considering” including GPS tracking devices in future ranges of its uniform products after conducting an online survey of both parents and children.

“As a direct result of the survey, we are now seriously considering incorporating a [tracking] device into future ranges” said Trutex marketing director Clare Rix.

The survey questioned 809 parents and 444 children aged nine to 16. It showed that 44% of parents were worried about the safety of pre-teen children, and 59% wanted tracking devices installed in school apparel. 39% of children aged nine to 12 were prepared to wear clothing with tracking devices in them, while teenagers were notably less enthusiastic and more wary of what Trutex has admitted they see as a “big brother” concept.

However, Trutex has claimed the tracking devices would bring about worthwhile benefits, including being a valuable resource for parents who wanted to keep a close eye on where their children were at all times.

“As well as being a safety net for parents, there could be real benefits for schools who could keep a closer track on the whereabouts of their pupils, potentially reducing truancy levels” says Rix.

Each year, Trutex supplies 1 million blouses, 1.1 million shirts, 250,000 pairs of trousers, 20,000 blazers, 60,000 skirts and 110,000 pieces of knitwear to the UK.

It is not the first company to manufacture school uniforms with a central focus on child safety; last week Essex firm BladeRunner revealed it was selling stab-proof school blazers to parents concerned about violence against their children. The blazers were outfitted with Kevlar, a synthetic fibre used in body armour. It has already received orders internationally, including Australia.

If the Trutex tracking devices go ahead, it is unclear where in the uniform they will be located.

Retrieved from “https://en.wikinews.org/w/index.php?title=UK_company_%22seriously_considering%22_GPS_tracking_devices_in_school_uniforms&oldid=482309”
" href="https://www.crgeng.com/interview-with-mathew-njenga-city-council-candidate-for-wards-2-6-in-brampton-canada/" rel="bookmark">
Interview with Mathew Njenga, City Council candidate for Wards 2 & 6 in Brampton, Canada

Thursday, October 5, 2006

The upcoming 2006 Brampton municipal election, to be held November 13, features an array of candidates looking to represent their wards in city council or the council of the Peel Region.

Wikinews contributor Nick Moreau contacted many of the candidates, including Mathew Njenga, asking them to answer common questions sent in an email. This ward’s incumbent is John A. Hutton; also challenging Hutton is Derrick Coke, Navdeep Gill, Jim Howell, Joyce Rodriguez, and Doug Whillans.

Retrieved from “https://en.wikinews.org/w/index.php?title=Interview_with_Mathew_Njenga,_City_Council_candidate_for_Wards_2_%26_6_in_Brampton,_Canada&oldid=704425”

Submitted by: Drew Pilton

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can’t access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions. A computer security risk is any action that could cause loss of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI’s top priorities. There are several distinct categories for people that cause cybercrimes, and they are refered to as hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy.

*The Hacker.

The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network.

*The Cracker.

The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It’s basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills.

*The Cyberterrorist.

A cyberterrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It’s just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning.

*The Cyberextortionist.

[youtube]http://www.youtube.com/watch?v=emdzQJQnK08[/youtube]

The term cyberextortionist refers to someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company’s network. They will request a paid sum of money to prevent the threat from being carried out, a bit like black mailing.

*The Unethical Employee.

An unethical employee is an employee that illegally accesses their company’s network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge.

*The Script Kiddie.

A script kiddie is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs.

*The Corporate Spy.

A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice.

Business and home users must do their best to protect or safeguard their computers from security risks. The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days.

When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks. Over the internet there is no powerful administrator which makes the risk a lot higher. If your not sure if your computer is vulnerable to a computer risk than you can always use some-type of online security service which is a website that checks your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a place that can do this. The typical network attacks that puts computers at risk includes viruses, worms, spoofing, Trojan horses, and denial of service attacks. Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user’s consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. It’s similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. The similarity is, the best way to avoid is preparation. A computer worm is a program that repeatedly copies itself and is very similar to a computer virus. However the difference is that a virus needs to attach itself to an executable file and become a part of it. A computer worm doesn’t need to do that, it copies itself to other networks and eats up a lot of bandwidth. A Trojan Horse named after the famous Greek myth and is used to describe a program that secretly hides and actually looks like a legitimate program but is a fake. A certain action usually triggers the Trojan horse, and unlike viruses and worms it will not replicate itself. Computer viruses, worms, and Trojan horses are all classified as malicious-logic programs which are just programs that deliberately harm a computer. Although these are the common three there are many more variations and it would be almost impossible to list them. You know when a computer is infected by a virus, worm, or Trojan horse if your computer displays one or more of these things:

*Screen shots of weird messages or pictures appear.

*You have less available memory than you expected.

*Music or sounds plays randomly.

*Files get corrupted.

*Programs are files don’t work properly.

*Unknown files or programs randomly appear.

*System properties fluctuate.

Computer viruses, worms, and Trojan horses deliver their payload or instructions through three common ways.

1 – When an individual runs an infected program so if you download a lot of things you should always scan the files before executing, especially executable files.

2 – When an individual boots a computer with an infected drive, so that is why it’s important to not leave removable media in your computer when you shut it down.

3 – When an unprotected computer connects to a network. Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment.

There are literally thousands of malicious logic programs and new ones come out by the numbers so that’s why it’s important to keep up to date with new ones that come out each day. Many websites keep track of this. There is no known method for providing 100% protection for any computer or computer network from computer viruses, worms, and Trojan horses, but people can take several precautions to significantly reduce their chances of being infected by one of those malicious programs. Whenever you start a computer you should have no removable media in the drives. This goes for CD, DVD, and floppy disks. When the computer starts up it tries to execute a boot sector on the drives and even if it’s unsuccessful any given virus on the boot sector can infect the computer’s hard disk. If you must start the computer using removable media for any reason, such as when the hard disk fails and you are trying to reformat the drive make sure that the disk is not infected.

How can you protect your computer?

The best way to protect your computer from any of the above is by using good quality internet securities software. Purchasing this from a reputable security company is recommended to ensure that your software is kept up to date with the most recent virus signatures. If you are not up to date an unrecognised virus will not be stopped by the software. A full security package will protect you from viruses, Worms, Trojan horses, keyloggers and will detect when a hacker is attempting to hack into your computer and prevent them from gaining access when you are online or connected to a network. It is not advisable to use a free antivirus service as these do not provide adequate protection and are a false economy. Recommended internet security software companies are:- Norton, McAfee and others.

About the Author: The auther is dedicated to PC security and PC health. See the Error Doctor Award Winning Registry Cleaner Software.

registry-cleaner-magic.com/error-doctor/

Source:

isnare.com

Permanent Link:

isnare.com/?aid=121797&ca=Computers+and+Technology

" href="https://www.crgeng.com/mlb-yankees-phil-hughes-earns-first-win/" rel="bookmark">
MLB: Yankees’ Phil Hughes earns first win

May 2, 2007

20-year-old pitching phenom Phil Hughes cruised through hitters in just his second start for the New York Yankees, but the end result created even more frustration for the organization and fans everywhere.

Hughes retired 19 Texas Rangers without allowing a hit on Tuesday at the Rangers Ballpark in Arlington. Established big league stars such as Kenny Lofton, Mark Teixeira and Michael Young could not solve the youngster’s blazing fastball or sharply biting curve. Hughes was on the verge of history. Even as his pitch count rose, the Yankees allowed him to keep firing. “He was fine,” manager Joe Torre said of the 2004 first round draft pick. “We were going to allow him to go 100 pitches last time, so I didn’t think that would be a problem.”

Just when the Yankees thought they found an answer to their early struggles, the organization was treated to an agonizing sight. After Teixeira fouled off an 0-2 pitch with one out in the sixth inning, Hughes grabbed his leg, having suffered a hamstring injury. His no-hit bid ended there (Texas would break up the no-hitter in the eighth inning off reliever Mike Myers), though he did earn his first big league win in a 10-1 Yankee romp over Texas. He walked off the mound under his own power, but will reportedly miss 4-6 weeks.

Hughes voiced his frustration afterwards: “It’s tough. It puts a damper on the whole thing.” He added, “I’m at a point now where our rotation really needs it,” referring to his presence on the New York pitching staff. Several Yankees have already voiced their excitement for the righthander’s chances in the big leagues. For his part, Yankees star Jason Giambi compared him to Roger Clemens during Spring Training: “He looks like a young Rocket.”

The Yankees are currently just 10-14, thanks in large part to injuries that have befallen pitchers Chien-Ming Wang, Mike Mussina, Carl Pavano and Jeff Karstens. In a related story from today, the Yankees fired strength and conditioning coach Marty Miller. Reportedly, this was out of general manager Brian Cashman’s concern for the alarming number of hamstring injuries so far this season.

Retrieved from “https://en.wikinews.org/w/index.php?title=MLB:_Yankees%27_Phil_Hughes_earns_first_win&oldid=544561”

Australian health workers to close intensive care units in Victoria next week

" href="https://www.crgeng.com/australian-health-workers-to-close-intensive-care-units-in-victoria-next-week-2/" rel="bookmark">
Australian health workers to close intensive care units in Victoria next week
Author: Admin

5 Oct

Thursday, March 13, 2008

Members of Australia’s Health Services Union (HSU) will go on strike in Victoria next week in a dispute over stalled wage and career structure negotiations. Over 5000 physiotherapists, speech pathologists and radiation therapists will walk off the job next week, effectively closing the state’s 68 largest health services.

The strike will force the closure of intensive care units and emergency departments across the state.

It is feared the strike could continue into Easter.

National secretary of the HSU, Kathy Jackson said admissions would be crippled, while intensive care patients would have to be evacuated to New South Wales, Tasmania and South Australia as hospitals will not be able to perform tests or administer treatment.

“When an ambulance shows up you can’t admit a patient without an X-ray being available, you can’t intubate them and you can’t operate on them,” she said.

“If something goes wrong in an ICU you need to be able to X-ray, use nuclear medicine or any diagnostic procedure,” said Ms Jackson.

Ms Jackson said the HSU offered arbitration last year, but the state government refused. “They’re not interested in settling disputes, they hope that we are just going to go away.”

“We’re not going away, we’ve gone back and balloted the whole public health workforce in Victoria, those ballots were successful, 97 percent approval rating,” she said.

The HSU is urging the government to commence serious negotiations to resolve the dispute before industrial action commenced.

The government has offered the union a 3.25 per cent pay increase, in line with other public sector workers but the union has demanded more, but stopped short of specifying a figure.

Victorian Premier John Brumby said the claim would be settled according to the government’s wages policy. “The Government is always willing and wanting to sit down and negotiate with the relevant organisations . . . we have a wages policy based around an increase of 3.25 per cent and, above that, productivity offset,” he told parliament.

The union claims it is also arguing against a lack of career structure, which has caused many professionals to leave the health service. Ms Jackson said wages and career structures in Victoria were behind other states.

Victorian Opposition Leader Ted Baillieu said he was not in support of the proposed strike and called on the government to meet with unions. “There could not be a more serious threat to our health system than has been announced today.”

“We now have to do whatever is possible to stop this strike from proceeding,” he said.

The opposition leader will meet with the union at 11:30 AM today.

Victorian Hospitals Industry Association industrial relations services manager Simon Chant said hospitals were looking at the possible impact and warned that patients may have to be evacuated interstate if the strike goes ahead.

Retrieved from “https://en.wikinews.org/w/index.php?title=Australian_health_workers_to_close_intensive_care_units_in_Victoria_next_week&oldid=4360153”

Doctor robbed, car-jacked and locked in boot while car set alight

" href="https://www.crgeng.com/doctor-robbed-car-jacked-and-locked-in-boot-while-car-set-alight/" rel="bookmark">
Doctor robbed, car-jacked and locked in boot while car set alight
Author: Admin

4 Oct

Monday, March 19, 2007

A 34 year old obstetrician from Forestville on Sydney’s Northern Beaches has escaped after he was robbed, car-jacked and locked in the boot (trunk) of his BMW, which was set alight. Police say the doctor was locked in the boot while his car was set alight, but was allowed to escape before flames engulfed the vehicle.

The Doctor was believed to have been heading to The Mater Hospital in North Sydney when he was waiting at the intersection of West and Falcon Streets in Chatswood around 3:15AM AEDT when a small red sedan with two men claiming to be police officers signalled him to stop. After crossing the intersection, the doctor stopped his car at the side of the road.

The doctor was then approached by the two men and when he asked to see identification, one man grabbed the keys from his car’s ignition before they both pulled the doctor out of his vehicle, hit him in the stomach with a hammer and stole his mobile phone and wallet. The robbers also demanded his key and credit cards along with their access codes before locking him in the boot.

Police allege that the men drove to several locations to withdraw cash and buy things before driving to Carisbook Street in Linley Point at around 4 a.m. local time where they set the car alight with the doctor still in the boot.

Crime Manager of the Harbourside Local Area Command, Detective Inspector Houlahan said that the doctor then “heard a click in the boot area and he heard someone call out: ‘Get out of the car'”

“When he pushed the boot up he found his car engulfed in flames.”

Det. Insp. Houlahan said the doctor told police he did not unlock the boot himself, and it appeared the man’s captors unlocked it before fleeing.

Det Insp Houlahan said that the doctor appeared to be “very distraught” and tired after the ordeal, and wanted to get home and see his wife and two young daughters.

He could only provide police with a vague description of his captors, but said the men were both Caucasian males aged in their 20s, and that one of them was about six feet tall (183cm) with short blond hair and medium build said Det. Insp. Houlahan.

Retrieved from “https://en.wikinews.org/w/index.php?title=Doctor_robbed,_car-jacked_and_locked_in_boot_while_car_set_alight&oldid=568419”

Creating The Kitchen Of Your Dreams With Custom Cabinetry

byAlma Abell

If you are building your new kitchen from the ground up, adding customized cabinets to your space might be the preferred option. Custom cabinets can be constructed to suit any space and layout, so they are especially helpful in oddly shaped spaces regardless of size. It is also a good idea to consider custom built cabinets if your current cabinets are too damaged for re-facing. Cabinets can take a beating over time, and some structural damage can take more than a coat of paint to fix. The benefits of adding custom cabinets to your new kitchen are immense, and when you enlist the help of professionals to assist you in their design you can guarantee the end result is going to be something you love.

Custom Cabinets are an Exceptional Choice if:

  • You are Building a Brand New Kitchen
  • Changing the Layout of Your Current Kitchen
  • Expanding your Kitchen and Need Additional Cabinets
  • Your Current Cabinets Cannot be Refaced

With Custom Cabinets Your Options are Limitless

While custom cabinets are certainly the most expensive option, the results last a lifetime. This means that while the initial cost can be a bit steep their lifetime value is well worth the price. Custom cabinets are built exactly to your taste, from design to dimension specifications everything you could possibly want is taken into consideration. This include any creative additions you would like to incorporate, like vertical pull outs that are perfect for storing spices, or drawer organizers that help you keep those odds and ends in check. The options are limited only by your creativity and imagination.

Build Your Custom Cabinets with the Pros

Working with professionals who specialize in cabinetry and design affords you the opportunity to eliminate common issues later. They are veterans when it comes to what works in a kitchen, and what doesn’t. If you are looking to begin your kitchen remodel in Fayetteville area, companies like Cabinet Transformations have a wide range of options, offer free estimates, and can advise you on the pros and cons of the material or style you choose.

Former Timberwolf Eddie Griffin dies at 25

" href="https://www.crgeng.com/former-timberwolf-eddie-griffin-dies-at-25/" rel="bookmark">
Former Timberwolf Eddie Griffin dies at 25
Author: Admin

3 Oct

Friday, August 24, 2007

Former National Basketball Association (NBA) player Eddie Griffin died on August 17, 2007, at age 25 due to injuries sustained in a car crash, the Harris County medical examiner’s office confirmed on Tuesday.

The former Minnesota Timberwolves forward, who was waived in March for violating the League’s substance abuse program, ignored a railroad warning, drove his SUV through a barrier, and collided with a moving train at about 1:30 a.m., according to Houston Police. His vehicle caught fire and was soon engulfed in flames.

No identification was found and the body was badly burned. For that reason, dental records were used to identify him. Griffin, who played college Basketball at Seton Hall University, played for the Houston Rockets from 2001–2003, and the Minnesota Timberwolves from 2004–2007. The five-year veteran had been battling alcoholism since leaving Seton Hall. He is survived by his three-year-old daughter Amaree.

Retrieved from “https://en.wikinews.org/w/index.php?title=Former_Timberwolf_Eddie_Griffin_dies_at_25&oldid=481387”

Author Amy Scobee recounts abuse as Scientology executive

" href="https://www.crgeng.com/author-amy-scobee-recounts-abuse-as-scientology-executive-4/" rel="bookmark">
Author Amy Scobee recounts abuse as Scientology executive
Author: Admin

30 Sep

Monday, October 11, 2010

Wikinews interviewed author Amy Scobee about her book Scientology – Abuse at the Top, and asked her about her experiences working as an executive within the organization. Scobee joined the organization at age 14, and worked at Scientology’s international management headquarters for several years before leaving in 2005. She served as a Scientology executive in multiple high-ranking positions, working out of the international headquarters of Scientology known as “Gold Base”, located in Gilman Hot Springs near Hemet, California.

Retrieved from “https://en.wikinews.org/w/index.php?title=Author_Amy_Scobee_recounts_abuse_as_Scientology_executive&oldid=4579695”

Pc Security

Submitted by: Amaan Goyal

Computers are the most useful and well-known technical gadgets used worldwide. Some uses it for their livelihood, some uses it for playing games on it and some uses it for browsing the Internet world. Among those who use the computer, most of us do not know the proper security steps that can be taken to prevent unauthorized access to their machines. Many of us do not hesitate surfing the Internet wirelessly on any hotspots without knowing the security part, which if turned out to be a Poisoned Hotspot can be very dangerous. Most of the hackers try to sniff data stored in the computer without the owner s permission. Taking some necessary steps can prevent these.

Types of computer attacks

There can be two types of attacks which a computer might face:

Active Attack

Passive Attack

[youtube]http://www.youtube.com/watch?v=on2QoYQKHEQ[/youtube]

Active attack is something where eavesdropping is on so that the data sniffer can sniff the data which is being transmitted over the network. These attacks are difficult to detect but can be prevented.

Passive attack is done by those who have an intention to destroy other s network security without having any aim of sniffing their data, but they are harmful as well. These attacks are easy to trace out but can be difficult to protect from those.

Remedies of computer security

The collection of various hardware and software specially designed to protect from data theft and other malicious stuffs are termed as computer security. There can be various solutions to protect the computers from unauthorized access from hackers and crackers. Hackers are those programmers who break the computer security with an intension to steal, destroy or change some data that is also treated as cyber-crime. Whereas, a cracker is a programmer who gains unauthorized access to a computer without having any specific intension as the hackers has. Some proper security tools might include firewall, anti-virus, anti-spyware, proper use of the Operating System and its browser etc. Let us discuss them one by one.

Firewall:- This can also be describes as a protected wall or shell all around the computer to detect and filter out the threats which try to access the computer in an unmeaning full manner. A firewall is the combination of hardware and software that is installed in the machine that helps in controlling the flow of data between computer networks. It helps the computer to protect from the hackers who can sniff data without the owner s permission.

Those who have Windows XP or Windows Vista as their operating system, for them getting a firewall is not a worry, they just need to make them active to protect themselves from the hackers and other unwanted stuffs. But those who doesn t have any of those two as their operating system, they need to have any other firewall software which is easily available in the market.

Anti-virus:- One of the most important tools for computer security is the anti-virus software. Though a firewall is always protecting from unwanted access to the computer network, but still some malwares make their way onto the computer by means of some attached file in the email or files from the Internet that the firewall cannot detect. For those malwares the antivirus software can be effective.

Antivirus software s are easily available in the market that doesn t cost much. Sometimes it is also bundles with a firewall as well which also includes in the security tool.

Some other security concerns are operating system; the web browsers and many more which should be updated regularly. One should also not click on the links which are there in unwanted emails, as they are might contain viruses and other malwares. Some people also face trouble when they download any free software that in some cases are bundled with viruses and spywares.

VTechCare represents a revolutionary new PC support model for Home Users, Home Professionals and Telecommuters leveraging the expertise and experience developed over the last 20 years in providing excellent technical support to customers across the globe. Our service is safe, secure and efficient.

About the Author: VTechCare was founded by Amaan Goyal,an industry veteran and entrepreneur, with the mission to provide high quality

computer support services

,

technical support services

that spans across software, hardware at the most reasonable reasonable prices across the globe.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=282485&ca=Computers+and+Technology