Helpful tips for October 2012

Hello there and welcome to our weekly feature of all kinds of tips.
We at the business desk are pleased to bring you our weekly feature of a
plethora of tips that cover a wide range of topics.
All of our tips are designed to help you save time, cut down on your
research, and help you get ahead.
So go ahead and read on.
This week we bring you our monthly tips.
It’s what we do for a living! We help you to help yourself!
From the business desk team at

Helpful tips for October 2012

In this issue:

General tips
Tech tips
Security tips for home computer users

General tips
Courtesy of the research team at

What exactly is conjunctivitis?
Well, it is probably most common in kids and it starts with runny eyes.
It is contageous and after diagnosis, you should keep your kids home for a
few days until it clears up.
It is also known as pink eye.
It is caused when dirty fingers are put into one’s eyes.

What’s this about putting baby to sleep?
Make sure that you put baby on a flat firm matress with no pillows close by.

All about presentations?
It has been said that just as the visual attention span of users cannot
more than seven items into memory at a time, so also, the oral attention
span of an audience cannot take more than three points into memory at a

You may be surprised to learn a tiny bit about the furniture industry!
Grand Rapids Michigan is known as the furniture center of North America.
It produces some of the best furniture on our continent.

What’s this about cold treatments versus hot treatments?
Well, here goes!
Cold treatments are best recommended for pain.
Hot treatments are recommended for swellings.
Best ways to use these?
Put a cold compress on first for about 20 minutes.
Follow this up with a hot treatment for the same length of time.
Then return to the cold treatment for another 20 minutes.

Okay, we are used to having free wifi in many of our North American hotels
but did you know this?
It is not the same for many hotels across Europe.
No, got to pay for this in Europe.

Here is a tip for opening up those difficult plastic bags .
Blow on the end of the bag and if this is the end that is supposed to open
up, then it surely will.


Tech tips
Taken from Melanie Mama’s corner
With a huge bouquet of thanks to Dan Thompson at

Create Your Own Audio Games

Are you a devoted player of audio games? Is your brain spinning around with
interesting and innovative ideas for games that you would like to make if
you only knew how to go about it? If the answer to both of these questions
is yes… Read on!

BGT is a revolutionary toolkit from Blastbay Studios which allows you to
produce your own audio games from the ground up, without having any prior
knowledge of computer programming at all. Who said game development had to
be complicated? BGT, which stands for Blastbay Game Toolkit, allows you to
spend all your valuable time coming up with new great ideas and concepts,
rather than wasting months struggling with never-ending programming guides
that don’t make any sense to begin with. If you fit into this category of
enthusiastic entrepreneurs, then BGT is the perfect tool for you to turn
your ideas into stunning reality.


Contains a powerful, high-speed game engine.

Uses an extremely versatile scripting language.

Comes bundled with many helper modules to make game creation even easier.

Ships with extensive documentation and example material.

Language syntax conforms mainly to that of C++, making it easy to learn
other programming alongside BGT.

The language tutorial is available in audio form, read by a professional
voice artist.

Two different versions to suit hobbyists and pros alike.

Liberal licenses – pay once, use forever.

BGT is currently in beta testing. This means that new features will be
added, old ones may be changed or removed, and there may still be bugs and
other stability issues.

We are more than happy to hear your feedback at this stage, so go ahead and
give the engine a test run and tell us what you think!

Click this link to visit the BGT page of the Blastbay Studios website


Debunking Internet Scams, Hoaxes, And Urban Legends

I have visited each link provided in the article to obtain the actual link
for inserting the web address for you to visit.

Aarticle Source:

Updated Sunday, 08/08/2010 – 05:40 by rhiannon

Here’s a list of outstanding sites to check out things that seem a little
iffy, too good to be true, or say send this to everyone you know!.

Internet scams, hoaxes and urban legends take many forms so it’s good to
have a few places you can go to see if something is true or not. Urban Legends Reference Pages

Launched in 1995, is one of the first, and best, in my opinion,
sites to target this growing area of interest and usually the first place I
go to check on something.

is another reliable site with the top 20 stories on in
the last hour being a good way to keep an eye on the latest items making the
rounds. : Current Internet Hoaxes, Email Rumors And Urban Legends

The page on current internet hoaxes, email rumors And urban
legends has a short but good list of items and includes a FAQ that defines
the differences between a hoax, a rumor and an urban legend.

“, Internet Scams, Identity Theft, and Urban Legends: Are You
at Risk?”

Another excellent site that cover not only myths, scams, and hoaxes, but
phishing, ID theft, and credit card fraud. Their email scams page

keeps on top of most recent items making the rounds.

The next time someone sends you email exclaiming “send this to everyone you
know!” you know where to check it out.


Definitions Of Various Security Related Terms

Here is a compilation of short definitions of these common security related

All the info is compiled from Wikipedia.

*What is a Malware:

Malware is actually the broadest category in which all such terms fall. As
per wikipedia:

Malware, short for malicious software, is software designed to secretly
access a computer system without the owner’s informed consent. Malware
includes computer viruses, worms, trojan horses, spyware, dishonest adware,
scareware, crimeware, most rootkits, and other malicious and unwanted
software or program.

Notice the use of word “informed consent” in above definition. This means
malware is not defined based on its functionality only. For example, if you
download and install a keylogger yourself for your own purpose, it might not
classify as a malware.

*What is Spyware:

As per Wikipedia:

Spyware is a type of malware that can be installed on computers, and which
collects small pieces of information about users without their knowledge.
The presence of spyware is typically hidden from the user, and can be
difficult to detect.

Here is more interesting info about Spyware on the same Wikipedia page:

While the term spyware suggests software that secretly monitors the user’s
computing, the functions of spyware extend well beyond simple monitoring.
Spyware programs can collect various types of personal information, such as
Internet surfing habits and sites that have been visited.

Going by this logic, it would meas even the cookies that websites install
fall in this category. This is especially true for those cookies that record
which websites we have visited, so that relevant ads can be shown to us. Of
course, all the websites that install such cookies have a privacy policy
sneaked somewhere that supposedly warns users about such cookies.

*What is Adware:

Adware is quite specific to displaying unwanted ads, here is what Wikipedia

Adware, or advertising-supported software, is any software package which
automatically plays, displays, or downloads advertisements to a computer.
These advertisements can be in the form of a pop-up.

*What is a Rootkit:

Rootkits are one of the most technically advanced malware. They are what
people normally perceive as viruses. Here is what Wikipedia says:

A rootkit is software that enables continued privileged access to a computer
while actively hiding its presence from administrators by subverting
standard operating system functionality or other applications. Once a
rootkit is installed, it allows an attacker to mask the ongoing intrusion
and maintain privileged access to the computer by circumventing normal
authentication and authorization mechanisms.

And here is the most scary part about Rootkits:

Rootkit detection is difficult because a rootkit may be able to subvert the
software that is intended to find it. Detection methods include using an
alternate, trusted operating system; behavioral-based methods; signature
scanning; difference scanning; and memory dump analysis. Removal can be
complicated or practically impossible, especially in cases where the rootkit
resides in the kernel; reinstallation of the operating system may be the
only alternative.

Of course, there are some rootkit scanners that help detect rootkits. Check
out free rootkit removers,

GMER, and

Trend Micro RootkitBuster

*What is a Virus:

This is the most popularly used term by security software, but probably also
the least understood one. Here is the exact definition from Wikipedia:

A computer virus is a computer program that can copy itself and infect a

A true virus can spread from one computer to another (in some form of
executable code) when its host is taken to the target computer; for instance
because a user sent it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, or USB drive.

The most important part of above definition is it “can copy itself”. This is
what separates a virus from other type of malware listed above. And this is
the feature that makes it most dangerous: Viruses can easily spread
themselves to multiple computers. A single virus infection in a corporate
network might play havoc with the entire network.

Do make sure you always have a good antivirus like AVG 2011,



Also check out:

How to Remove Virus from PC.

*What is a Trojan Horse:

This is a less commonly used term, but the software that it represents is
equally dangerous. Definition from Wikipedia:

A Trojan horse, or Trojan, is malware that appears to perform a desirable
function for the user prior to run or install but instead facilitates
unauthorized access of the user’s computer system. It is a harmful piece of
software that looks legitimate.

Users are typically tricked into loading and executing it on their systems.

*What is a Worm:

Definition of Worm looks too similar to that of a Virus, but the definition
also points out differences between both:

A computer worm is a self-replicating malware computer program. It uses a
computer network to send copies of itself to other nodes (computers on the
network) and it may do so without any user intervention. This is due to
security shortcomings on the target computer. Unlike a virus, it does not
need to attach itself to an existing program. Worms almost always cause at
least some harm to the network, even if only by consuming bandwidth, whereas
viruses almost always corrupt or modify files on a targeted computer.

I hope these definitions would leave you more knowledgeable about these
scary looking terms that we come across a lot nowadays.


Security tips for home and small business computer users
By the business desk team

For the month of October 2012
Tips for safe password use

One of the most intimidating things for any home computer user these days is
being able to stay one step ahead of those hackers and cyber pirates. It is
simply no longer enough to be able to just install the necessary software.
You need to know where to get it, why you need to do so, and how to install
This could all be very time consuming at the best of times! It could also
be very daunting and frightening and after a long hard day, you really don’t
want to spend time looking for information on the Internet. You would
rather just have someone supply you with what you need to know.
Impossible you say? Not really! Here at, our
research team can provide you with all kinds of information that will help
you to stay one step ahead. You request it and we provide it! Research
is our business.
Here is some free research info for you.

Tips for safe password use
Help Net Security
After the news about the theft of millions of user passwords from the …
such as a home or office PC. Always ensure that security software is up to
Read more at:

Nine tips to secure wireless home network
Apart from decreasing speed and increasing internet bills, unsecured
connections have lot of complications on security of a user.
Read more at:

Five Mobile Security Tips for the Frequent Traveler
Business Insider
If you are a frequent business traveler, then you’ve probably
perfected the process of getting through the security lines at airports
with as much ease and as little stress as possible. However
‘perfect’ …. Tech Advice For Small Businesses. dashlane …
Read more at:

Create a cyber security plan for your business
A cyber attack on a small business could end the business. At an
event in my community a couple years ago, we had a speaker
address the audience about her experience as a small business
owner. Hackers from a foreign … There are many resources …
Read more at:

So what do you think? How long do you think it would have taken you to find
this piece of info?

So the next time you are stuck on how to do your research, no matter how big
or small it is, drop us an email at and we would
be delighted to help.

This entry was posted in Uncategorized. Bookmark the permalink.