Saturday, April 30, 2011

27 Malware Types and Their Characteristics

What is malware? Malware is exactly what its name implies: mal (meaning bad, in the sense of malignant or malicious rather than just poorly done) + ware (short for software). More specifically, malware is software that does not benefit the computer's owner, and may even harm it, and so is purely parasitic.

Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U.S. states, including California and West Virginia.

Image and video hosting by TinyPic

Let's review the most common types of malware:

  1. Adware

Adware is any type of advertising-supported software that will play, display, or download advertisements automatically on a user's computer once the software has been installed on it or while the application is in use. Some adware can also be spyware due to its privacy-invasive characteristics.

  1. BackDoor
A backdoor in a computer system (or cryptosystem or algorithm) is a means of circumventing regular authentication, securing remote computer access, accessing plaintext, etc., while remaining to be undetected. A backdoor may appear to be an installed program or a modification to a program or hardware device that's already installed.

  1. Baiting

Baiting uses tangible media and relies on the curiosity or greed of the victim. Baiting involves an attacker leaving a malware infected media such as a CD ROM or USB flash drive in a public place where it is likely to be found, appearing to be legitimate and appealing, and waits to be used by the victim. Baiting is easy to perform as in this example where an attacker might create a malware loaded CD with a company logo on it, and the words "Company Reorganization Plan" on the front. The media is left on the lobby floor of the targeted company. An employee could find it and then insert it into a computer to satisfy their curiosity. By inserting the CD into a computer to view its contents, the user unknowingly installs malware on it, allowing the attacker access to his computer and possibly, the company's computer network. If there is no mechanism to block the malware, then computers set to "auto-run" inserted media could be immediately compromised when the CD is inserted.

  1. Botnet

Botnet is a collection of software robots, or bots, that are automatic and self-directed. Botnet is often associated with malware but can refer to the network of computers using distributed computing software.

Botnet generally refers to a group of compromised computers called zombie computers running software that is usually installed via worms, trojans or backdoors, under a common command-and-control infrastructure.

  1. Browser plugin

A browser plugin is a software program that extends the capabilities of your Internet browser in a specific way. Not all browser plugins are harmful and some may be helpful. This category contains mostly dubious browser plugins such as "Search Assistant", toolbars, etc. that have been known to transmit user data to their creators or have been installed using covert means.

  1. Crimeware

Crimeware is a distinct type of malware designed to automate financial crime by performing identity theft to access online accounts of users at financial institutions and online retailers for the express purpose of stealing funds from those accounts or performing unauthorized transactions to the benefit of the thief controlling the crimeware. Crimeware is often used to export private information from a network for financial exploitation. Crimeware is viewed as a growing concern in network security as this type of threat seeks to steal confidential information.

  1. Computer virus

A computer virus is computer software that has the ability to replicate itself and infect a computer without the informed consent or knowledge of the computer user. Certain malware, adware and spyware have been incorrectly termed as a "virus" because they lack the ability to copy themselves. A real virus spreads from one system to another through an executable code when its host is transferred to a target computer; such as being sent over a network or the Internet, email or transported via removable media such as a CD, DVD or USB drive. Infected files residing in a network file system or any instance where a computer can be accessed by another one increases the chances of spreading a virus infection.

The term "computer virus" is considered to be malware, a much broader term which also encompasses several types of malicious software including worms, trojans, and others. Although technically different, viruses are often confused with computer worms and trojans. Unlike a virus, a worm can take advantage of security holes in order to spread itself among other systems, while a trojan appears to be harmless but has an underlying plan. A worm, trojan or virus, once executed, can endanger a computer's data, operation, or network ability. User awareness of some computer viruses and other malware may be readily apparent while many other types go unnoticed.
The increasing number of computers being connected to local area networks and the Internet is creating an environment for computer viruses to spread. Increased use of email and instant messaging are additional ways computer viruses spread.

Image and video hosting by TinyPic

  1. Computer worm

A computer worm is a self-replicating computer program that sends copies of itself within a computer network and it can do so without any involvement by the user. A worm doesn't need to attach itself to an existing program in order to spread. Worms typically cause some harm to the network, most notably by consuming bandwidth.

  1. Data miner

A data miner's primary function is to gather data about an end user. Some adware applications may employ data mining abilities.

  1. Email bomb

An email bomb is a form of network abuse by sending enormous amounts of emails to an address in an attempt to overflow the mailbox or overwhelm the mail server where the email address is hosted in what is called a denial-of-service attack.

  1. Email spoofing

Email spoofing is a fraudulent email activity in which parts of the email header and the sender address are modified, appearing as if the email was sent from another source. This technique is commonly used for spamming and phishing to conceal the origin of an email message. By altering certain properties of the email header, such as the From, Return-Path and Reply-To fields, fraudulent users can make the email appear to have been sent from someone other than the real sender.

Sometimes the source of the spam email is indicated in the Reply-To field. If the initial email is replied to, it will be delivered to the address specified in the Reply-To field, which might be the spammer's address. But most spam emails, especially malevolent ones carrying a trojan or virus, or those advertising a website, falsify this email address, sending the reply to another potential victim.

  1. Exploit

An exploit is a portion of software, data, or string of commands that take advantage of a computer bug, glitch or vulnerability disrupting normal behavior on computer software, hardware or other electronic device. Usually this includes seizing control of a user's computer system or attacks that allow privilege escalation or a denial of service.

  1. Fast flux

Fast flux, DNS technique, is used by botnets to conceal phishing and malware distribution sites behind a continuously changing network of compromised host systems utilized as proxies. Fast flux can also refer to a combined peer-to-peer network, distributed command and control, web-based load balancing and proxy redirection to make malware networks less detectable and more resistant to counter-measures.
Fast flux may be seen by Internet users in phishing attacks linked to crime organizations, including attacks on social networks.

  1. Fraudulent dialers

Dialers are used to connect computers to the Internet but fraudulent dialers are designed to connect to premium-rate numbers. Fraudulent dialers are often installed through security holes in a computer's operating system and will change the computer settings to dial up through the premium-rate number. The additional monies are collected by the provider of the fraudulent number. Some dialers inform the user of benefits for using the special number to access special content which is usually illegal materials or downloads.

Users that have DSLs or other broadband connections are usually not affected since a dial is dependent on regular phone lines. But, if an ISDN adapter or additional analog modem is installed, the dialer may be able to connect.

Malicious dialers can be identified by:
  • A download popup opens when a website is opening.
  • The website may or may not discreetly display a price.
  • The download initiates even if the cancel button has been clicked.
  • Without any notice, the dialer installs as a default connection.
  • The dialer perpetuates unwanted connections without any user action.
  • No notice about the price is presented before dialing in.
  • While connected, the high price of the connection is not shown.
  • The dialer cannot be easily uninstalled if at all.

  1. Hijacker

Hijacker is an application that attempts to take control of the user's homepage and replace it with one that the hijacker chooses. It is a low security threat, but is annoying. Most hijackers use stealth techniques or trick dialog boxes to perform installation.

Browser hijackers commonly do one or more of the following:
  • Change your "search" page and passes all searches to a pay-per-search site
  • Change your default home page to the company page. Sometimes the software changes them to a portal featuring porn sites.
  • May transmit URLs viewed toward the company server

Image and video hosting by TinyPic

  1. Keylogger

A keylogger is surveillance software capable of recording all the keystrokes a user makes and saving that to a log file, which is usually encrypted. A keylogger recorder captures information entered on a keyboard including instant messages, email and any other type of information. Some keyloggers record email addresses the user uses and URLs that are visited. The log file created by the keylogger can then be sent to a designated receiver.

As a surveillance tool, keyloggers, are often used in the workplace by employers ensuring work computers used by employees are for business purposes only. However, keyloggers can be embedded in spyware allowing the user's information to be sent to an unauthorized third party.

  1. Loyaltyware

Loyaltyware is a sub-form of adware. Loyaltyware is a type of software that works around the concept of user loyalty by providing incentives in the form of cash, points, airline miles, or other type of goods while shopping.

  1. Parasiteware

Parasiteware is the term for any adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites. The controversy is centered on companies like WhenU, eBates, and Top Moxie, popular makers of adware applications. These companies release their software to assist users in getting credit for rebates, cash back shopping, or contributions to funds. To the end user, parasiteware represents little in the way of a security threat.

  1. Phishing

Phishing is a criminally fraudulent process of collecting sensitive information such as usernames, passwords and credit card details by pretending to be a trustworthy entity in an electronic communication. Communications supposedly from well known social networks, auction sites, online payment processors or IT administrators are common fronts to bait the unsuspecting computer user. Phishing is commonly performed by email or instant messaging, directing users to enter details at a fake website that mimicks a legitimate one. Even when using server authentication, it may not be apparent that it is a fake website. An example of social engineering techniques, phishing is used to trick users, exploiting the weaknesses of web security technologies. The rising number of phishing scams has prompted and increase of legislation, training for the user, public awareness, and technical security procedures.

  1. Rogue security software

Rogue security software uses malware or malevolent tools to advertise or install itself or forces computer users to pay to remove nonexistent malware. A trojan is often installed by rogue software when downloading a trial version, or it will run other unwanted actions. Rogue software makers want users to install and purchase their product. A common tactic to install their program, is to display fake Windows dialog boxes or other browser pop-up with messages that entice the user to click on them. Usually a message is displayed such as "WARNING! Your computer is infected with Spyware/Adware/Viruses! Buy [software name] to remove it!", another message is "Click OK to scan your system" without asking to buy the software. Yet another example is "Computer/Internet Connection/OS is not optimized and to Click Here to scan now". Once the user clicks the OK button ing the dialog box, he will be directed to a malicious website, which installs the program. Sometimes, clicking close window or X button in an attempt to close the dialog box will have the same effect. (To circumvent that trick, Press Alt+F4 or use Ctrl-Alt-Delete to access the Task Manager). Some rogue software will download the trial version automatically without any user interaction. In addition to rogue programs being installed, many sites now use a technique to install multiple trojans at once by downloading a dropper first, loading various malware to the unsuspecting user's computer.

  1. Rootkit

A rootkit is a software system containing one or more programs designed to show no indication that a system has been compromised. A rootkit is used to replace essential system executables, which can then conceal processes and files installed by the attacker as well as rootkit itself. A rootkit's intention is to control the operating system. Rootkits obscure their presence on the system through by evading standard operating system security mechanisms. Rootkits can also be trojans, tricking the user into thinking they can be safely run on their systems. This can be achieved by concealing running processes from monitoring programs, or hiding files or system data from the operating system. Rootkits are also capable of installing a "back door" in a system by changing the login mechanism (such as /bin/login) with an executable that accepts a secret login combination, allowing the system to be accessed by an attacker, even if changes are made to the actual accounts on the system.

Originally, rootkits may have been normal applications, designed to take control of a faulty or unresponsive system, but more recently have been produced as malware allowing attackers to gain access to systems undetected. Rootkits exist for a variety of operating systems, such as Microsoft Windows, Linux, Mac OS, and Solaris. Rootkits often install themselves as drivers or kernel modules or modify parts of the operating system, depending on the internal elements of an operating system's mechanisms.

  1. SmiShing

Smishing is a criminal activity that utilizes social engineering techniques similar to that of phishing. The name originated from "SMs phISHING". SMS or Short Message Service, is the technology behind text messaging on cell phones. Like phishing, smishing uses text messages on cell phones to lure a user into revealing personal information. The method used to actually "capture" user's information, or "hook", in the text message could be a website URL, although it is more typical that a phone number is displayed that connects to an automated voice response system.

  1. Smurf attack

The Smurf attack is a means of producing a large amount of traffic on a computer network. This is a type of denial-of-service attack that overwhelms a target system via spoofed broadcast ping messages. In this case, an attacker sends a large volume of ICMP echo requests, or pings, to IP broadcast addresses, all having a spoofed source IP address of the targeted victim. If the routing device that delivers traffic to those broadcast addresses sends the IP broadcast to all the hosts, then many of the hosts on that IP network will take the ICMP echo request and send an echo reply, thus multiplying the traffic by the number of hosts that respond. Hundreds of machines on a multi-access broadcast network could reply to each packet.

  1. Spamware

Spamware is software designed by or for use by spammers. Spamware can include the capability to import thousands of email addresses, generate random email addresses, insert fraudulent headers into messages, use multiple mail servers at once, and use open relays. Spamware can also be used to locate email addresses to build lists for spamming or to sell to spammers.

  1. Spyware

Spyware is computer software that is installed on a user's computer without the user's express consent with the purpose of collecting information about the user, their computer or browsing habits.

As the term implies, spyware is software capable of secretly monitoring the user's behavior, but can also collect various types of personal information, including web surfing habits and websites visited. Spyware can also impede the user's control of his computer by installing additional software, and redirecting web browser activity. Spyware is known to cause other interference by changing computer settings that slow connection speeds, load different home pages, and lose Internet connectivity or program functionality.

With the proliferation of spyware, an antispyware industry has sprung up. Use of antispyware software is now a widely accepted practice for the security of Microsoft Windows and desktop computers. A number of anti-spyware laws have been passed, targeting any software that is surreptitiously installed with the intent to control a user's computer. Due to its privacy-invasive characteristics, the US Federal Trade Commission has placed a page on their website advising consumers on how to lower the risk of being infected by spyware.

Image and video hosting by TinyPic

  1. Trojan horse

The Trojan horse, or trojan, is a type of malware that appears to have a normal function but actually conceals malicious functions that it performs without authorized access to the host system. A Trojan can allow the ability to save their files on the user's computer or monitor the user's screen and control his computer.

A trojan is not technically a virus but can be easily and unknowingly downloaded by the computer user. One example might be a computer game, when executed by the computer user, allows a hacker to control the user's computer. In this case the computer game is a trojan.

  1. Wabbit

Wabbits are in fact rare, and it's not hard to see why: they don't do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.


Sources and Additional Information:


Thursday, April 28, 2011

High Homocysteine - Risk Factor for Alzheimer's Disease

Overview

Multiple researches revealed the statistically significant trend, showing that people with high blood levels of homocysteine have at least double than average risk of developing Alzheimer's disease later in life.  Homocysteine is created when the body uses the amino acid, methionine, for methylation.  Normally homocysteine is converted back to methionine, or used to create cysteine and other useful substances.  If these conversions are blocked homocysteine accumulates leading to a host of negative reactions.

Homocysteine, which damages blood vessels, nerves, and specifically mitochondria, has been linked to heart attacks, strokes, cancer (particularly colon, breast, and prostate cancer), Alzheimer's disease and other neurological diseases, depression, birth defects, gout, cervical dysplasia, erectile dysfunction and rheumatoid arthritis.

Image and video hosting by TinyPic

What is Homocysteine?

Homocysteine (ho-mo-SIS te-en) is an amino acid (a building block of protein) that is produced in the human body. Homocysteine may irritate blood vessels, leading to blockages in the arteries, called atherosclerosis. High homocysteine levels in the blood can also cause cholesterol to change to something called oxidized lowdensity lipoprotein, which is more damaging to the arteries.

In addition, high homocysteine levels can cause blood clots to form more easily than they should, increasing the risk of blood vessel blockages. A blockage might cause you to have a stroke or a problem with blood flow. Up to 20% of people with heart disease have high homocysteine levels.

Homocysteine is normally changed into other amino acids for use by the body. If your homocysteine level is too high, you may not have enough B vitamins to help this process. Or you may not have enough of the enzymes to process homocysteine.


The B Vitamins Reducing Homocysteine

Efficient conversion of homocysteine requires certain nutrients, which neutralize homocysteine's toxicity by transforming it into useful substances.  The most well-studies nutrients are folic acid, vitamin B12, and vitamin B6. Choline, betaine (TMG), creatine, riboflavin, zinc, magnesium and other nutrients also help detoxify homocysteine.

Based on the association between elevated homocysteine and Alzheimer's disease, strategies that lower homocysteine levels to safe ranges, including supplementation with B vitamins, are recommended.

Vitamin B12

Research has suggested that low cobalamin (vitamin B12) levels are related to dementias in general. In a study evaluating levels of vitamin B12 in patients who had Alzheimer's disease or frontotemporal dementia, researchers found a significant negative correlation (the lower the level of vitamin B12, the more the deterioration) between vitamin B12 and degree of cognitive deterioration. A population-based longitudinal study in Sweden of 370 people aged 75 years or older who did not have dementia found that subjects who had low levels of vitamin B12 or folate had twice the risk of developing Alzheimer's disease over the 3-year period of the study.

Vitamin B6

A study found significantly lower consumption of vitamin B6 after age 60 years in patients with Alzheimer's disease compared to control subjects. Low vitamin B6 levels are also associated with elevated numbers of lesions on the brains of patients with Alzheimer's disease.

Folate (a form of vitamin B9)

Folic acid is needed for DNA synthesis and to make S-adenosylmethionine (SAMe). A study of 126 patients, including 30 who had Alzheimer's disease, found that the levels of folate in cerebrospinal fluid were significantly lower in patients with late-onset Alzheimer's disease. Another longitudinal analysis of people between the ages of 70 and 79 years found that people who had high levels of homocysteine or low levels of folate had impaired cognitive function. The strongest association between abnormal levels and dementia was found in people who had low folate levels, leading researchers to suggest that folate might reduce the risk of cognitive decline.

Your Diet

Dr. David Snowden shows in his Kentucky Nuns Study that nuns who were most likely to suffer Alzheimer's disease have low blood levels of the vitamin folic acid and high levels of the protein building block homocysteine. Not eating enough leafy greens and whole grains can deprive you of the vitamin folic acid, and eating too much meat provides you with too much methionine, and the combination of these two factors raises brain levels of homocysteine, that punches holes in arteries and causes plaques to form in them to cause ministrokes, which damages your brain.

Methionine is an essential protein building block that your body uses to make another nonessential building block called cysteine. If you lack any of the three vitamins: B12, folic acid or pyridoxine, methionine is converted to a poison called homocysteine that damages arteries and causes strokes, heart attacks and Alzheimer's disease. Meat is one of the richest sources of methionine, and leafy greens and whole grains are full of folic acid that prevents methionine from being converted to homocysteine. Reducing your intake of meat and poultry lowers your intake of methionine. Folic acid is found everywhere in nature that you get carbohydrates, because folic acid helps your body convert carbohydrates to energy. You can help to prevent Alzheimer's disease by getting folic acid from all whole grains and fortified cereals, leafy green vegetables, beans, seeds, nuts, and many other plants; and by reducing your intake of methionine by eating less meat.

Image and video hosting by TinyPic

The amount of vitamin B12 actually needed by the body is very small, probably only about 2 micrograms or 2 millionth of a gram/day. Unfortunately, vitamin B12 is not absorbed very well so much larger amounts need to be supplied through the diet or supplementation. The richest dietary sources of vitamin B12 are liver, especially lamb's liver, and kidneys. Eggs, cheese and some species of fish also supply small amounts, but vegetables and fruits are very poor sources. Several surveys have shown that most strict, long-term vegetarians are vitamin B12 deficient. Many elderly people are also deficient because their production of the intrinsic factor needed to absorb the vitamin from the small intestine decline rapidly with age.

Image and video hosting by TinyPic

 Vitamin B6 is found in a wide variety of foods including fortified cereals, beans, meat, poultry, fish, and some fruits and vegetables. The best sources of vitamin B6 include spinach, bell peppers, and turnip greens. Very good food sources of vitamin B6 include garlic, tuna, cauliflower, mustard greens, banana, celery, cabbage, crimini mushrooms, asparagus, broccoli, kale, collard greens, Brussels sprouts, cod and chard.

Image and video hosting by TinyPic

Vitamin B Supplements

The usual recommended vitamin and folate doses for lowering homocysteine levels are as follows: a daily multivitamin containing 400 �g of folate and less than 5 mEq of iron. An additional 800 �g of folate per day for 8 weeks. If this does not lower your homocysteine level, you may need a higher dose.

It is important to get your homocysteine level rechecked after you have been taking the multivitamin and folate for 8 weeks. If your homocysteine level remains high, you may need to take more folate (2 mg per day). If you have had a high homocysteine level, you may need to have your level checked later.


Sources and Additional Information:




Wednesday, April 27, 2011

Low Vision Impact on Social Activities for Older Adults

Quality of Life

Vision impairment is associated with a diminished quality of life. Older adults with impaired vision are less able to perform routine activities of daily living, are less mobile, are more isolated, suffer higher rates of depression, and consequently, have a substantially reduced overall quality of life when compared to their normal-sighted counterparts. Impaired vision is a significant independent risk factor for falls and fractures in older people. The ability to travel independently, often linked with issues of quality life, becomes challenging and daunting in the presence of vision loss. Older individuals, especially those with vision impairment, face greater safety risks when crossing busy intersections and when driving. Visually impaired older adults find it difficult, if not impossible, to read for pleasure, watch television, movies and sports for recreation with friends and family, barring them from the most common forms of social engagement, which can further add to a sense of isolation and depression. They confront formidable challenges in using computers and harnessing the internet to access information, to communicate, and to pursue lifelong education through increasingly available online courses. With the aging of the population, the growing number of visually impaired older Americans who are losing the ability to care for themselves further contributes to this major public health concern.

Image and video hosting by TinyPic

Social Life Effects

Low vision affects the social activities of older persons in a number of ways. Psychologically, low vision limits senior citizens because they are often afraid to leave their homes. Studies have shown that low vision adults have a much harder time moving about in unfamiliar places than in their more familiar homes. Senior citizens who know they are more likely to fall in an unfamiliar area may be likely to leave the home. This can add to the social isolation that the elderly already face.

Low vision also plays a more direct role in limiting the social activities of low-vision senior citizens. Interacting with other people can be challenging for the elderly because many features within human faces tend to be low contrast. Examples of low contrast features include the nose and sometimes the lips. Inability to easily see the lips may impact individuals' ability to communicate, especially if they are also hard of hearing and rely on lip movements to help them understand spoken language. Senior citizens often have a difficult time recognizing even the most familiar people by visual cues alone.

Social activities are also limited by transportation issues. We already discussed the impact of low vision on driving for senior citizens. Many elderly will not leave their homes unless absolutely necessary because driving can be extremely hazardous. This inability to get from one place to another severely impacts the ability to socialize outside the home.

Finally, poor acuity contributes to the lack of social activities by limiting senior citizens' ability to read. Menus, bibles, sheet music, playing cards, dominoes and other common items used during social functions are often printed in small print, making them difficult to read. Rather than deal with the frustration of being unable to function normally in a social setting, the elderly often choose to avoid these situations altogether.

Image and video hosting by TinyPic

Recommendations

Each situation is special and requires individual approach. We will offer basic generic recommendations on how diminish negative effects of low vision on your social life.

  1. Magnification Devices

Many of the difficulties associated with loss of vision are due to reduced reading ability, and most people with low vision find magnifiers helpful for short daily tasks � such as reading mail or expiry dates on food.

A wide range of magnifiers are available, and they differ in strength and how they are used. Some magnify close work tasks and others are used for objects further away.

Image and video hosting by TinyPic

Types of magnifiers for close work:
  • Hand held: cheap and widely available in a good range of magnifying powers X1.5 to X15. They can be held in one hand, and they are often available with a light in them. It can be difficult to use a hand-held magnifier if there's a hand tremor.
  • Stand: slightly more bulky than a hand held magnifier, but they are fitted with a stand that rests against the page, making it easier to keep the object in focus. Stand magnifiers can be available in powers of 2x to 20x magnification and are often fitted with a light.
  • Spectacle mounted: the magnifier lens is fitted into a spectacle frame. This is not the same as ordinary spectacles. It does allow both hands free but requires the book to be held very close to the spectacles.
  • Electronic magnifiers: spectacle mounted, hand held and stand magnifiers are limited to about 20x magnification, whereas some electronic aids can achieve 70x. Most electronic aids use a camera to create an enlarged image on a viewing screen. Other features can be incorporated, such as improved contrast between the object and the background and often object size can be changed using a zoom function. Electronic magnifiers are not currently available through most NHS low vision clinics, but can be bought privately.

There are also different distance magnifiers available mostly for employment and educational purposes:
    • Telescopes: telescopic systems can achieve a magnified image, but it's difficult to use due to the small field of vision. Training is often needed before a person can use the telescope well.
    • Binoculars: you can use both eyes to view far off objects. This can useful if you have nystagmus (shaky eyes).

The stronger the magnifier, the bigger it makes the object appear. Unfortunately, the stronger magnifiers become the smaller the amount of print they can view. It is not possible for a really strong magnifier to cover the whole page of a book.

Image and video hosting by TinyPic

  1. Large Print
It is understandable that there are special books, printed in large print for vision impacted readers. But the same approach should be taken for all other devices you use. Choose mobile phone with easy distinguishable buttons and large onscreen fonts, adjust your computer settings to accommodate your needs for screen resolution and large fonts in display settings, seek for GPS with good and easy to use zooming capabilities.

  1. Planning your Social Activities
Being retired is having some substantial advantages, and having more available time to plan better your activities, including social life, is one of them. First of all, do elaborated research and choose the activities and entertainment events, where your vision impairment impact will be minimized and will not affect much your participation. Plan carefully, and do not forget your optical devices. If you need to walk or to drive to the unfamiliar area, review the address and driving/walking directions carefully to avoid surprises, mostly unpleasant. Use online services and handheld/car GPS devices to get the best directions.

Keep your mobile phone handy to call for assistance if needed.

  1. Night Activities
Whenever possible, restrict your outings to the day time, when impact of your low vision is minimal. If you need to attend evening entertainment activities, consider to ask for designated driver or call a taxi. You will not have to deal than with driving complication at the night time and difficulties to locate the right address.

Handling social situations for a person with low vision (Dr. Bill Takeshita)

If you have 45 minutes now, and you want to get better perception on how to deal better in social life while affected with low vision, I would recommend downloading and reviewing the audio lecture on how to handle social situations for a person with low vision. Dr. Bill Takeshita discusses ways and approaches on how to improve your social life when you have low vision. Link for downloading: http://ping.fm/CdToh


Sources and Additional Information:


http://tinyurl.com/3k7pvum

Marking Up and Reviewing Documents Online with Crocodoc

Crocodoc offers free online services allowing all users to upload documents in the most useful and popular formats, such as DOC, PDF, PPT, and collaboratively mark them up and place various annotations on them. While the service does not allow changing the text itself on the document, users are able to place comments on the document in various ways in form of sticky notes, highlighted text, and adding drawings.

Comments show up on the right of the document and can be replied to as well as deleted by the comment creator. Creating an account will allow you to keep track of your created documents and comments, but you can use all of Crocodoc's tools without an account as well.

The following formats are supported: PDF, DOC/DOCX, PPT/PPTX, PNG, and JPG.

Image and video hosting by TinyPic



What can you use the application for?

In addition to its unique name, Crocodoc also provides its users with a valuable service utilizing tools that are quickly becoming mandatory in today's business world, as well as offering solutions to the problems of communicating about a collaborative project when the team players are not located in the same office. Crocodoc offers the option for anyone to work with, and edit, a number of different types of documents, including Word documents, PDF documents, web pages, and PowerPoint slides. There is no charge for this basic service. However, a Pro service that offers more options for data management and security is available. Within the Crocodoc website, there is a user forum that was set up to offer helpful information on typical problems encountered by users, as well as answers to specific questions posed by users. Unfortunately, the forum seems to contain a number of spam posts and comments that are posted in response to users valid suggestions. In addition, there seems to be little feedback from the website managers.

What is the history and popularity of the application?

Founded by three MIT graduates, and one MIT attendee who dropped out in order to help launch successful internet startups, Crocodoc's creators are the same people who brought WebNotes, a tool used by professionals and educators across the globe to manage research, to the web. Y Combinator, and other investors provide funding for Crocodoc. The company is based in Silicon Valley California, and also has offices in Boston.

What are the differences to other applications?

There is no need to register to use the services of the site. However, commenting in the forum does require signing up and logging in first. It appears that the only way to sign up is by using an existing account with sites such as Facebook, MySpace, Yahoo, Twitter, Blogger, WordPress, and AOL, among some other, lesser known sites. For most users of the Crocodoc site, this should not be a problem. For the few people without such accounts, setting up such an account will take mere minutes.

How does the application look and feel to use?

The Crocodoc website is clean and uncluttered. There are a minimum of tabs to navigate, and the site is user friendly. The tools that Crocodoc offers are visible on the home page in order to facilitate ease of use.

How does the registration process work?

There is no need to register to use the services of the site. However, commenting in the forum does require signing up and logging in first. It appears that the only way to sign up is by using an existing account with sites such as Facebook, MySpace, Yahoo, Twitter, Blogger, WordPress, and AOL, among some other, lesser known sites. For most users of the Crocodoc site, this should not be a problem. For the few people without such accounts, setting up such an account will take mere minutes.

What does it cost to use the application?

Crocodoc's free usage option does not offer a way to track documents made with the service. The option to bookmark those documents made as a tracking system is available, however. For users that need, or want more, however, a Pro plan is available. For $8 per month, or $36 per year, the Pro plan offers the option to password protect documents, upload larger file sizes, saved edited documents as PDFs, and lots more tools that almost any business, or educational service, will find useful. The Pro plan does require registration as well as creating a user name and password. Payment is via a credit card with security and processing completed by Chase Paymentech. No credit card information is stored on the Crocodoc system.

Who would you recommend the application to?

Users in the business field as well as in the education field will find that using Crocodoc's services will streamline their collaborative processes.

Crocodoc Features

  • Crocodoc offers lots of options if a user needs help. Emailing the support team is always an option, as well as utilizing the Live Chat feature.
  • No registration is necessary in order to use the Crocodoc website tools.
  • Those users who desire more security options, as well as data management tools, have the option to sign up for the Crocodoc Pro plan for a modest yearly, or monthly, fee.
  • Crocodoc is a free service that is available for anyone to use.
  • The website interface is uncluttered and laid out in a pleasing manner that allows users to get straight to work.

Access the Crocodoc website to check the offered features: http://crocodoc.com/



Tuesday, April 19, 2011

20 Recommendations on how to improve sleep for Alzheimer's patients

Sleep changes in Alzheimer's

Scientists do not completely understand why sleep disturbances occur in people with dementia. Sleep disturbances associated with Alzheimer's disease include increased frequency and duration of awakenings, decrease in both dreaming and non-dreaming stages of sleep, and daytime napping. Similar changes occur in the sleep of older people who do not have dementia, but these changes occur more frequently and tend to be more severe in people with Alzheimer's disease.

Image and video hosting by TinyPic

Some people with Alzheimer's disease sleep too much while others have difficulty getting enough sleep. When people with Alzheimer's cannot sleep, they may wander during the night, be unable to lie still, or yell or call out, disrupting the rest of their caregivers. Some studies have shown that sleep disturbances are associated with increased impairment of memory and ability to function in people with Alzheimer's. There is also evidence that sleep disturbances may be worse in more severely affected patients. However, a few studies have reported that sleep disruption may also occur in people with less severe impairment.

Coexisting conditions may intensify sleep problems for older adults with Alzheimer's. Two conditions in which involuntary movements interfere with sleep are periodic limb movement and restless leg syndrome. Other common conditions that disrupt sleep include nightmares and sleep apnea, an abnormal breathing pattern in which people briefly stop breathing many times a night. In a recent study, researchers at Stanford University Medical Center found that a gene associated with OSA is also associated with a higher risk of AD and other chronic illnesses such as heart disease.

Depression in a person with dementia may further worsen sleep difficulties

Shifts in the sleep-wake cycle of people with Alzheimer's can be severe. Experts estimate that in the later stages of the disease, affected individuals spend approximately 40 percent of their time in bed awake and a significant proportion of their daytime hours asleep. This increased daytime sleep consists almost exclusively of light sleep that compensates poorly for the loss of deep, restful nighttime sleep. In extreme cases, people with dementia may experience complete reversal of the usual daytime wakefulness/nighttime sleep pattern.

Image and video hosting by TinyPic

Treatment of Alzheimer's sleep problems

Although widely used medications can temporarily improve the sleep disturbances of older adults, a number of studies have found that prescription drugs do not improve overall ratings of sleep quality in older people, whether they are living in their homes or in residential care. Thus, the treatment benefits of using sleep medications in individuals with dementia may not outweigh the potential risks. To improve sleep in these individuals, the U.S. National Institutes of Health (NIH) has encouraged use of the nondrug measures described below rather than medication therapy unless the sleep disturbance is clearly related to a treatable medical condition. It is important that the person experiencing sleep problems be professionally assessed for medical or psychiatric causes for the sleep disturbance before applying any drug or nondrug interventions.

Non-drug treatments

A variety of nondrug treatments for insomnia have been shown to be effective in older adults. These treatments, which aim at improving sleep routine and the sleeping environment and reducing daytime sleep, are widely recommended for use in people with Alzheimer's disease. To create an inviting sleeping environment and promote rest for a person with Alzheimer's:
  1. Maintain regular times for going to bed and arising.
  2. Establish a comfortable, secure sleeping environment. Attend to temperature and provide nightlights and/or security objects. Keep your bedroom dark, quiet and a little cool for the best results. Move out any mirrors from the bed to avoid disturbing light reflection.
  3. Stick to rituals that help you relax each night before bed. This can include such things as a warm bath, a light snack or a few minutes of reading.
  4. Avoid as much as possible emotionally disturbing activities for several hours before sleep time, like reading horror books, listening current events on radio, planning for uncomfortable phone conversation, etc.
  5. Don't take your worries to bed. Bedtime is a time to relax, not to hash out the stresses of the day.
  6. Do not stay in bed while awake; avoid utilizing bed for activities other than sleep or intimacy.
  7. If you awaken at night, do not watch television.
  8. Overall, keep daily TV exposure to a minimum, especially within the four-hour period before bedtime.
  9. Establish regular meal times.
  10. Do not go to bed on empty stomach, if you know that hunger may wake you up at the middle of night. However, stick to light meals only not to load your digestive system to work hard at night.
  11. Avoid alcohol, caffeine and nicotine. Caffeine in soda, tea, coffee or other products may contribute to sleeplessness, and alcohol can contribute to confusion and anxiety.
  12. Avoid excessive evening fluid intake and empty the bladder before retiring.
  13. Avoid daytime naps if you are having trouble sleeping at night. If you must snooze, limit the time to less than one hour and no later than 3 p.m.
  14. Treat any pain symptoms.
  15. Seek morning sunlight exposure. Light therapy with a specialized light box may be helpful, too.
  16. Engage in regular daily exercise, but no later than four hours before bedtime.
  17. If you take cholinesterase inhibitors (tacrine, donepezil, rivastigmine or galantamine), avoid nighttime dosing.
  18. Administer drugs such as selegiline that may have a stimulating effect no later than six to eight hours before bedtime.
  19. If sleep-disordered breathing is suspected, consider continuous positive airway therapy. This therapy involves the use of a machine that supplies the patient with a continuous stream of air. Studies have shown this therapy to be successful among Alzheimer's disease patients.
  20. If you can't fall asleep, leave your bedroom and engage in a quiet activity. Return to bed only when you are tired.

Image and video hosting by TinyPic

Sleep Medications for Alzheimer's Patients

Drug therapy should be considered only after a nondrug approach has failed and reversible medical or environmental causes have been ruled out. For those people who do require medication, it is imperative to "begin low and go slow." The risks of sleep-inducing medications for older people who are cognitively impaired are considerable. These include increased risk for falls and fractures, increased confusion, and decline in the ability to care for oneself. If sleep medications are used, an attempt should be made to discontinue them after a regular sleep pattern has been established.

The list of medications that treat sleep disorders is lengthy, and includes drugs ranging from tricyclic antidepressants, such as Pamelor or Aventyl (nortiptyline), to traditional sleeping pills like Ativan (lorazepam). Aricept (donepezil), a medication already approved to temporarily limit the progression of Alzheimer's disease, has also been shown to increase oxygen saturation in patients with Alzheimer's-related sleep disordered breathing.

Each medication has possible side effects that should be discussed with a physician prior to beginning treatment.

Image and video hosting by TinyPic


Sources and Additional Information:

Monday, April 18, 2011

Malwarebytes Anti Malware Freeware Review

You have the free or commercial antivirus software installed on your computer as the first line of the real-time protection. However, you never can rely 100% on blocking all unwanted "guests" on your computer. As you realize that your computer has been infected by malware, you start looking for the emergency cleaning solution.

Depending on the intruder, system recovery may be fast and easy, and may be difficult and tiresome. In any case, you need several utilities to remove the enemy and destroy all traces of its presence on your harddrive and registry. There are many free utilities, claiming to do the job. Do not trust the promises and advertising. There are still fake anti-malware programs, which may bring even more harm to your system. Chose only trusted solutions, and trusted downloading sources.

While I have about 10 different portable software programs on my USB toolbox, I have already established certain routine on how I approach disinfection task on affected computers. And Malwarebytes is one of the "medicines" I am running at the beginning of the recovery process.

Image and video hosting by TinyPic

Using Malwarebytes is simple and friendly, while the program can find intruders and do the job with exceptional quality and speed.  After you run it, click Scan, and it checks your system for infections. There are two options: you can either do a quick scan, or a more comprehensive scan. For an initial scan, it is recommended to perform a long but thorough comprehensive scan.

After the program reports its findings, it will clean the infections for you or place the dangerous files in quarantine before killing them. The software also has Ignore List, so when you are positive that Malwarebytes is over-protective and the malware definition is false, you can put it on the list, and the next time, it won't be identified as malware.

Note that you can run Malwarebytes' Anti-Malware program for free to scan and disinfect your system. But if you want to enable real-time protection to stop your PC from being infected in the first place, and to schedule scans, you'll have to register it. For consumers and personal use, it is a onetime fee of $24.95.

Image and video hosting by TinyPic

Details

  • Latest Version: 1.50.1
  • File Size: 7.35 MB
  • Operating Systems: Microsoft Windows 2000, XP, Vista, 7.
  • Languages Available: English, Arabic, Belarusian, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Korean, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish.

Freeware Key Features

  • Light speed quick scanning.
  • Ability to perform full scans for all drives.
  • Database updates released daily.
  • Quarantine to hold threats and restore them at your convenience.
  • Ignore list for both the scanner and Protection Module.
  • Settings to enhance your Malwarebytes' Anti-Malware performance.
  • A small list of extra utilities to help remove malware manually.
  • Works together with other anti-malware utilities.
  • Command line support for quick scanning.
  • Context menu integration to scan files on demand.



There is no official portable version, as developers claim that for this product is not important � software can be installed and cleanly uninstalled fast and easy. If you still prefer to use portable version, google it, and you will find the downloading links at once. 



Thursday, April 14, 2011

Chat Roulette and it 23 Clones

Chatroulette concept came to the Internet World with website Chatroulette.com.It is quite simple, you enter and allow to connect you web cam. That is all, no registration is necessary. Website pairs random strangers from around the world together for webcam-based conversations. Visitors to the website randomly begin an online chat (video, audio and text) with another visitor. At any point, either user may leave the current chat by initiating another random connection.

Image and video hosting by TinyPic

The Chatroulette web site was created by Andrey Ternovskiy, a 17-year-old high school student in Moscow, Russia. Ternovskiy says the concept arose from video chats he used to have with friends on Skype, and that he wrote the first version of Chatroulette in "two days and two nights". Ternovskiy chose the name "Chatroulette" after watching The Deer Hunter, a 1978 film set in the Vietnam War in which prisoners of war are forced to play Russian roulette.

According to a survey carried out by RJMetrics, approximately 1 in 8 of feeds from Chatroulette involved 'R-rated' content. While it is definitely not recommended for kids, in spite or because the controversial content, the site gained a lot of exposure and popularity. More than that, the concept itself gained popularity, so there are multiple websites, offering similar services to its visitors.

In this Rating List, we are going to present original Chatroulett site and its latest clones.

Please access the list through the following link, and leave your opinion if you familiar with one of the presented sites: http://ping.fm/sbJdA

Some funny screenshots from ChatRoulette, so you can get better prepared of whom you might meet on site (Click to Enlarge).

     


How to Turn your Hobby into Retirement Income?

You most likely have at least one or two activities you enjoy in your free time, but have you ever thought that these hobbies can become a basis for your emotional and financial support at your retirement? Definitely, it might be difficult to impossible to convert your hobby into a side business at first, and into a main business after you retire. Use the following guidelines to get the ball rolling:

  1. Start early. Even before you get to the point when you need to get busy at retirement, review your interests and hobbies portfolio, and think, what activities you like to do, and what kind of your skills can bring a joy and some income at the same time. Take some time to think about what you'd enjoy doing, not what you think would make the most money. This is important with a side business because if you have a full-time job, you might be spending nights and weekends on your hobby, and you want it to feel more like fun than work. Otherwise, you're bound to burn out.

Image and video hosting by TinyPic

  1. Explore and investigate. Be sure to investigate multiple alternative options. We all know that success is not instant. It might take a few tests to find the hobby that brings in the income that you want. Be patient persistent to get positive results.

  1. Transform volunteer work into retirement job.  Seniors who have been volunteering with a local non-profit can find ways to turn their passions into a business. For example, youth mentoring skills may lead to a summer leadership program for teenagers.

Image and video hosting by TinyPic

  1. Turn previous career skills into a new retirement venture. Jobs for retirees often stem from the technology, marketing, communication and sales skills developed during the working years. For example, a retiree could combine a passion for food with well-honed writing skills to start an income-producing blog or website.

  1. Be creative. If you think your hobby could never generate side income, it's time to get a little more creative. Write down a list of skills and activities you enjoy. Here are some examples of how a hobby or skill can turn into a side business:
    • Love to play the guitar? Perform at weddings or offer music lessons.
    • If scrapbooking is your thing, offer to create scrapbooks for busy moms or family reunions.
    • Got a green thumb? Help homeowners landscape or set up kitchen gardens.
    • Jewelry makers can have a shop up and running in no time thanks to sites like Etsy.
    • A seamstress can make one-of-a-kind baby clothes for high-end, local baby boutiques.
    • Computer-savvy people can help others set up their machines and run routine maintenance.
    • Internet addicts can make some extra cash with internet marketing and affiliate programs.
    • Fluent in a second (or third) language? Translate for a high-traffic blog or give English lessons to native speakers of one of the languages you speak.

    • Don't force it. Sometimes a hobby isn't meant to be a highly profitable business, but you can earn enough cash to support your hobby or generate a small income stream. If you try to force your hobby to be profitable, however, you might find that you've sucked the joy out of it.

    Image and video hosting by TinyPic

    1. Don't underestimate your ability. You probably know more than you think you do. After all, a hobby is something in which you have a real interest. You've probably read industry news, followed blogs, researched products and materials, and spent hours of time on your hobby. A person who loves to bake might take for granted that anyone could make chocolate chip cookies, when in fact, plenty of people lack the time, while others might set the kitchen on fire. You might think anyone can do what you do, but many probably can't, don't have time, or would rather pay someone else to do it.

    1. Research the viability of the business idea.  Before jumping into retirement careers, investigate the competition, the costs involved in starting the business and any legal requirements for operating the business. Create a business plan, clarifying the expenses associated with starting and running the business and keeping you focused on the steps necessary to make the business work.

    1. Market yourself. People shy away from selling themselves. It can be uncomfortable, but it doesn't have to be that way. Make sure friends, family members, and acquaintances know what you do. Often an outgoing friend will sell you for you by talking you up to everyone he or she knows. People like to connect people with problems to people with solutions. Also, when you strike up conversations with potential customers, try not to think of it as selling something. Look at it as solving a problem. If you're a seamstress and you're talking to someone who is complaining that they've lost weight and their clothes no longer fit, offer to help with alterations. Remember, you are filling a need.

    Image and video hosting by TinyPic

    1. Follow up with your customers. Sometimes the best business comes from repeat customers or referrals. If you want to increase your income, it can be as easy as a phone call or email to a recent customer. Hopefully they will give you valuable feedback on your services or product. The gesture shows that you care about what you do and want to provide the best for the customer. Think of how happy they will be and, in turn, how many people they will tell about you and your hobby. Following up is a great way to build a small hobby into a growing business.

    1. Hone your skill. If you want to have a successful side business, you have to continually improve your skills. This shouldn't be too painful, since you've picked a hobby you love! Read books, take a class, go to trade shows, and talk with other people who share your hobby. Keep adding to your knowledge base.

    Image and video hosting by TinyPic


    Sources and Additional Information:




    http://tinyurl.com/6hxuq8r