Sunday, August 5, 2007

Adrenalin - the fear hormone

Imagine you are alone in a dark street. Suddenly you hear footsteps. Someone is following you. What happens ?

Your heart beats faster. Your breathing gets faster. Cold sweat appears on your forehead. You run away as fast as you can.

Luckily, our bodies make a hormone to help us. It is called adrenalin and its's made in the adrenal glands next to your idneys. When you are frightened or upset, it makes your heart beat faster. This way, it can pump more blood into you muscles ad make them faster and stronger. At the same time, your liver makes extra glucose so that your cells are full of energy. This will help you run away faster.

Prehistoric man often had to run away from wild aimals. Adrenalin helped him to make a fast getaway, or to fight with extra strength. This is why adrenali is sometimes called the 'fight or flight' hormone.

Yoga Body and Soul

Hormones, the body's messengers

There are two different types of glands in your body :

1. Endocrine glands produce hormones which travel around the inside of your body carrying messages to your organs. There are several hormone-making glands and they are all quite different from each other. You can find them in different parts of your body.

2. Exocrine glands produce hormones which have an effect on the surface of the body. For example, the saliva glands make your mouth water, the sweat glands make your skin go sweaty and the tear glands make you cry, or make your eyes water.

Who needs hormones ?
Every hormone has its own special task. Each hormone has to do three dfferent types of hormone jobs :
1. Hormones tell the cells to produce substance. For example, the hormone gastrine tells your stomach to produce juices which break down the food you eat.

2. Hormones can speed up or slow dow your metabolism, which is a complicated word for the chemical reactions that take place in your body.

3. Hormones make cells grow in all parts of our body and become more specialised. The growth hormone, for example, makes sure that all parts of your body grow to the right size.


Norton 360 All-In-One Security Annual Subscription - 3 PCs

'Cop raped me, took nude pix'

PENANG: A factory worker has lodged a police report against a police officer for allegedly raping her and then taking pictures of her in the nude at a hotel in George Town here.

And to add to the woman's misery, the police officer, an Assistant Superintendent in his late 40s, mailed the pictures to her army officer husband and two colleagues last month.

She befriended the policeman, who was used to be attached to the Seberang Prai police but was recently transferred to Kuala Lumpur, when she went to see him to reduce her traffic summons in 2004.

The alleged rape took place sometime in the past three years. The policeman wanted to continue seeing the mother of five, who is in her 30s, after his transfer but she refused and he threatened her.

Her husband received the lewd pictures of his wife, which were sent to his office through the post. He confronted her and took her to lodge a police report on July 24.

Statements have since been taken from both parties. A laptop computer, a handphone and a printer were seized from the policeman's office in Kuala Lumpur last week.

The lewd pictures, said to have been taken when the woman was asleep, have also been handed over to the police as evidence.

Police have classified the case as criminal intimidation by anonymous communication under Section 507 of the Penal Code, which carries a two-year jail term and a possible fine.

State police chief Deputy Comm Datuk Koh Hong Sun, when contacted yesterday, confirmed that a police report had been lodged but declined to elaborate as investigations were pending.
- reported The Star


Microsoft Windows XP Home Edition FULL VERSION with SP2

Keep Meat Safe !

Meat is a perishable food. When buying and handling meat, make sure that you keep the meat in a clean and cold condition until you are ready to cook it. Bacteria multiply quickly if meat is placed in temperatures above 4 degress celsius. Refrigeration alone cannot guarantee the long shelf life of meat. Hygiene and packaging are very important as well.

The folowing tips will help you ensure that the meat you buy retains its qualiyt and safetly for consumption.

Buying meat
* Buy meat that looks fresh and has no sourish, stale or off odours.
* Only buy meat that has been stored under proper rerfigerated conditions.
* Meat packages should not be damaged.
* Buy in quantities that will meet your family's needs.
* Head home immediately after buying meat so that it will not be left unrefrigerated for too long.
* Choose meat that has no excessive moisture on the surface of the meat. Excessive moisture indicates that the meat has not been handled or stored properly.

Handling meat
* Separate raw meat from cooked or ready-to-eat food to prevent cross-contamination.
* When handling meat, use separate cutting boards and utensils for raw meat and cooked food.
* For frozen meat, thaw only the amount you need.
* Thaw frozen meat safely in the refrigerator or the microwave oven.
* Chilled and thawed meat should be placed in the refrigerator if not cooked immediately.
* Do not re-freeze meat that has been completely thawed.
* Do not leave chilled or thawed meat at room temperature for more than 2 hours as bacteria will multiply rapidly.
* After cutting raw meat, wash the cutting boards and utensils thoroughly with dish-washing detergent and hot water.

Storing meat
* Follow the recommeded safe handling and storage information on the packages, if any.
* Ensure that there is sufficient space between items placed in the refrigerator or freezer so that cold air can circulate freely around them.
* Prepared meat such as minced meat or meat cubes have a shorter storage time.
* Do not open the refrigerator or freezer doors more often than necessary to avoid temperature fluctuation.
* If you need to freeze the meat, divide into portions based on your normal serving size.
* To avoid excessive evaporation, wrap the meat tightly in clean plastic bags before storage.
* When storing or thawing meat in the refrigerator, place the meat in containers or trays to prevent the juices from contaminating other food.
* Do not overstock your meat supply. Follow the rule of first in / first out, i.e. use older stock first.


ezWake iPod Alarm Clock/Radio with 22 Key Remote

Criminals could hijack your iPhone to send spam

iPhones, like computers, could be hijacked and used to spread spam if the device's owner visits a doctored website or Internet hotspot, security researchers reported recently.

The vulnerability of Apple Inc.'s popular only theoretical for now. There are no reports of criminals actually taking advantage of the security glitch to remotely access an iPhone.

But if it were exploited, hijacked iPhones could be very useful to the same gangs that take over personal computers and use them to disseminate spam, said Charlie Miller, principal security analyst at Independent Security Evaluators, which discovered the flaw.

"You could have a million iPhones dialing the company's main line and overwhelm it that way," Miller said.

Hijacked iPhones could also be used to send spam by cell-phone text message, which computers generally can't. Any personal data on the phones, such as private phone numbers and text messages, would be accessible as well.

The flaw applies not only to the iPhone, which was launched just three weeks ago, but also to Apple computers running Mac OS and the company's Safari Web browser, a version of which comes with the iPhone. It does not affect Safari running on Microsoft Corp.'s Windows systems.

Miller and the rest of the ISE team, which included Jake Honoroff and Joshua Mason, discovered holes in the security of the iPhone within minutes of getting their hands on their boss' phone.

"He didn't really want to let us do it, but eventually he gave in, and we poked around with it for a few minutes, and already saw some things that could make the programs crash," Miller said.

The researchers at Baltimore-based ISE haven't released the specifics of the vulnerability to the public, but have provided details to Apple and supplied the company with a patch, a software update for plugging the hole. Source: Xinhua/agencies

Insten iPod Docking Speaker System w/ Subwoofer - Black or White

ITunes sells over 3 bln songs

Apple company, which makes the market-leading iPod digital media player, said iTunes has sold more than 3 billion songs since its launching four years ago, media reported Wednesday.

The milestone came just six months after iTunes, Apple Inc.'s online music download service, surpassed the 2 billion tracks-sold mark. The service was launched in April 2003 and, until February 2006, sold its first 1 billion songs.

ITunes has surpassed Amazon.com Inc. and Target Corp. to become the third-largest music retailer in the United States, according to media reports.

The iTunes catalog contains over 5 million songs, 550 television shows and 500 movies. Apple's line of iPod portable music players has been key to iTunes' popularity.

In April, Apple company said it had sold more than 100 million iPods. It reached that milestone in the five and a half years since the first iPod was sold.

Perhaps most importantly, Apple offered not just the downloading service but also the hardware for managing music collections.

"They've made it brain-dead simple to buy, download and move content around onto iPods, computers and now iPhones," said Gartner analyst Mike McGuire.

Analysts refers to this as the digital music "ecosystem," which comprises the hardware, software and downloading service. Each plays a role in giving Apple a leading share of the digital music world. Source:Xinhua/Agencies


Microsoft Streets and Trips 2008 with GPS

Apple issues patches for iPhone, Mac OS X, Safari beta


Apple released three batches of software updates and fixes for its iPhone, Mac OS X operating system and the Safari 3.03 browser beta, media reported Thursday.

The iPhone fixes address a pair of Safari-related vulnerabilities that came up almost immediately after the phone's release.

This is Apple's seventh security update this year. The bundled patches address approximately 45 vulnerabilities.

The iPhone 1.0.1 update came in just under the wire and beat the Aug. 2 deadline set by the Independent Security Evaluators (ISE), which found the vulnerability.

Researchers Charles Miller, Jake Honoroff and Joshua Mason set the clock ticking when they notified Apple of the flaw and gave the company two weeks to fix the problem before a planned presentation at the annual Black Hat conference in Las Vegas.

Users who visit a maliciously crafted Web page could open themselves to an exploit through which a criminal could gain access to SMS (short message service) messages, the address book, call history and voice mail data. iPhone wasn't the only Apple product that needed some patching.

Apple also issued 25 fixes for Mac OS X 10.3.9 and 10.4.10, addressing networking and audio functions, Kerberos security and vulnerabilities in PHP and Tomcat, plus numerous Web-based cross-site scripting and remote code execution vulnerabilities.

For the Safari 3 beta, Apple issued four fixes, two of which are the same fix as found in the iPhone. Another patch fixes a flaw that prevents Java applets from loading should the user have Java disabled. Finally, there is a Windows XP fix that handles buffer overflows when adding a new URL to the favorites list.

To install the patch, iPhone users will need an Internet connection and the latest version of iTunes, Apple said. When the iPhone is connected to the computer, iTunes will give the user the option to install the update.

Those who select "don't install" will have the option to get the update the next time the phone is connected, but Apple cautioned iPhone users not to wait. Source:Xinhua/agencies

The World of Harry Potter
Google