Tuesday, July 15, 2008

The Ants and the BIble

The Ants





Do you know that, according to the Bible, the ants have a superior intelligence, which is almost second to man’s? Proverbs 30:24-28 says--

“There are four things which are little upon the earth but they are exceeding wise: The ants are a people not strong, yet they prepare their meat in the summer; The conies are but a feeble folk, yet make they their houses in the rocks; The locusts have no king, yet go they forth all of them by bands; The spider taketh hold with her hands, and is in kings’ palaces.”

While Proverbs 6:6-8 says--

“Go to the ant, thou sluggard, consider her ways, and be wise; Which having no guide, overseer, or ruler, Provideth her meat in the summer, and gathereth her food in the harvest.”

We have to remember that it is the Bible itself that considers the ants as wise. And in their being wise, they no longer need any ruler, or leader, for them to enjoy a sophisticated way of life.

Do you know that the ants’ dwelling place is even air-conditioned? They are storing food for the entire duration of the rainy season. They have their own knowledge in agriculture. They collect organic matters, which serve as their food during the lengthy rainy season.

Do you know that the ants that we see everyday are mostly female? They live in a colony that is made up of more than one million members, workers, and soldiers that are all females. The male ants die after the queen ant fertilizes. The queen ant’s only duty is to lay about 50,000 to 100,000 eggs a day.

According to studies conducted by zoologists, there about 12 million to 14 million kinds of ants in our planet. And like humans, they are found in almost all habitable places, except in mountains that are covered with ice, and in the polar region. Based on studies, the ants have unusual physical features. Their head is made of a special sensor that easily identifies chemical and visual signs. In addition, they have about half a million nerve cells in their brain. They have a keen vision and a sensitive hair that responds to anything attached to it. Their teeth are as sharp as a carving tool. They have strong muscles that allow their six legs to move. When needed, they are able to secrete liquid from their special glands that warn their companions in case of an impeding danger. Out of their poison glands, they are able to discharge formic acid and other poisons, which they use against their enemies. Their antenna functions as their nose and fingers.

Within 24 hours, they are able to build their houses. And this lasts for more than a month, and this is where their queen lay eggs. There is another colony of ants, which is called “army ants,” that build their houses neither on the ground nor on trees. Their bodies linked together serve as a shelter for their queen. About 200,000 to 750,000 ants link their bodies together in order to cover the queen and her young. But when morning comes, the separate. Other ants, however, live underground.

According to reports, the ants are able to dig about 40 tons of soil in order to build their gigantic home. A colony of ants can maintain 150 houses, and they are able to patrol 1,600 square metes. The territory of ants is one of the biggest in the world of insects. The soldier ants stay only on the sides of their house in order to guard it from attacks of enemies. Should enemies come, they send a signal that could be smelled by their comrades so that they could be given reinforcement. They surround their enemies and spit on them formic acid. And when they are killed, they bring them to their camp to be eaten.

Do you know that ants are able to communicate and send messages to their colleagues by means of a liquid called “pheromone”? This is the reason why when an ant discovers food deposits, it could easily call on its companions who would gather them.

Another remarkable trait of ants is their industry. One can never see a sleeping ant. Have you seen one? That is why an ant is being used as a paragon of industry. As written in Proverbs 6:6-10--

“Go to the ant, thou sluggard, consider her ways, and be wise; Which having no guide, overseer, or ruler, Provideth, her meat in the summer, and gathereth her food in the harvest. How long wilt thou sleep, O sluggard? When will thou arise out of thy sleep? Yet a little sleep, a little slumber, a little folding of the hands to sleep.”

Let us not be lazy; let us not be sluggards. It is not good to be one.

Sunday, July 6, 2008

Gasoline Fill Up Tips

Realize the Value

Got this email last week..


Tips on Filling your Vehicles...


This is a Message received from a friend from india:

I don't know what you guys are paying for petrol... but here in Durban, we are also paying higher, up to 47.35 per litre. But my line of work is in petroleum for about 31 years now, so here are some tricks to get more of your money's worth for every litre.

Here at the Marian Hill Pipeline, where I work in Durban, we deliver about 4 million litres in a 24-hour period thru the pipeline.

One day is diesel; the next day is jet fuel, and petrol, LRP and Unleaded. We have 34-storage tanks here with a total capacity of 16,800,000 litres.

ONLY BUY OR FILL UP YOUR CAR OR BIKKIE IN THE EARLY MORNING WHEN THE GROUND TEMPERATURE IS STILL COLD. Remember that all service stations have their storage tanks buried below ground. The colder the ground, the denser the fuel, when it gets warmer petrol expands, so buying in the afternoon or in the evening.... your litre is not exactly a litre.

In the petroleum business, the specific gravity and the temperature of the petrol, diesel and jet fuel, ethanol and other petroleum products play an important role. A 1degree rise in temperature is a big deal for this business. But the service stations do not have temperature compensation at the pumps.

WHEN YOU'RE FILLING UP, DO NOT SQUEEZE THE TRIGGER OF THE NOZZLE TO A FAST MODE. If you look, you will see that the trigger has three (3) stages: low, middle, and high. In slow mode, you should be pumping on low speed, thereby minimizing the vapours that are created, while you are pumping. All hoses at the pump have a vapour return. If you are pumping on the fast rate, some of the liquid that goes to your tank becomes vapour. Those vapours are being sucked up and back into the underground storage tank so you're getting less worth for your money.

ONE OF THE MOST IMPORTANT TIPS IS TO FILL UP WHEN YOUR TANK IS HALF FULL. The reason for this is, the more fuel you have in your tank, the less air occupying its empty space. Petrol evaporates faster than you can imagine. Petroleum storage tanks have an internal floating roof. This roof serves as zero clearance between the petrol and the atmosphere, so it minimizes the evaporation.

Unlike service stations, here where I work, every truck that we load is temperature compensated, so that every litre is actually the exact amount.

ANOTHER REMINDER, IF THERE IS A FUEL TRUCK PUMPING INTO THE STORAGE TANKS, WHEN YOU STOP TO BUY, DO NOT FILL UP - most likely the petrol/diesel is being stirred up as the fuel is being delivered, and you might pick up some of the dirt that normally settles on the bottom.

Hope, this will help you get the maximum value for your money.


DO SHARE THESE TIPS WITH OTHERS! LET’S SHARE INFORMATION AND BENEFIT ALL, FOR THE BETTER OF MANKIND.

Safe and Secure Internet

Simple and easy ways to keep your computer safe and secure on the Internet


It is a fact; the Internet is just not a safe place to connect your computer to. There are worms constantly scanning for vulnerable computers to infect, trojans disguised as helpful programs but actually install malicious ones, spyware that reports your activities back to their makers, and hijackers that take control of your web browser and browsing experience. For those people who have been the victim of one of these mentioned infections, removing them and getting your computer back in your control can be a daunting and frustrating experience. The purpose of this article is to teach you how to setup your computer in such a way that you minimize as much as possible the risks of contracting one of these infections. Each step is very easy to do and regardless of your computer experience you will have no trouble following along. It is also important to note that there is not one step listed below that is more important than the other. They are all equally important to keeping your computer safe and secure.

  1. Educate yourself and be smart about where you visit and what you click on - Understanding how you can get infected and what to avoid when using the Internet will be the most important step in keeping your computer clean and secure. The majority of people who have infections on their machines were infected due to lack of knowledge and clicking on things that they should not. I will provide a list of actions under this step that you should not do:
        1. Do not open attachments from users that you do not know. This is one of the most effective ways for viruses to infect you. If you do not know the user, then simply do not open the email and delete it.
        2. Never open an attachment that is a .exe, .pif, .com, or .bat unless you specifically know the file is clean. The majority of these are always bad!
        3. If you visit a site and a popup appears saying that your computer is unsafe, ignore it! These are gimicks that are used to make you click on the ad which then can potentially install unwanted malware.
          An excellent list that contains a list of antispyware apps that should be avoided and a list of ones that are recommended can be found here: Rogue/Suspect Anti-Spyware Products & Web Sites
        4. When a you go to a site and a popup occurs, many times they will make them look like a normal Windows message box in order to trick you into clicking on them. Instead just close them by clicking on the X.
        5. Do not visit porn sites! I know some of you may not be happy about this, but the reality is that the majority of spyware and browser hijackers are put on your computer through porn sites.
        6. Do not visit warez sites! Not only is pirated software illegal, but it is a breeding ground for malware.
        7. Do not visit crack sites! Many of the cracks include malware in them!
        8. If you use P2P software, make sure you are careful about what you open. Malware is all over the P2P networks.
        9. Read the license agreement for any software that you install. Many free downloads are offered with spyware and other programs that you DO NOT want on your computer. Reading the agreement may help you to spot them.
  2. Use an AntiVirus Software - It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

    See this link for a listing of some online/stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources
  3. Update your AntiVirus Software - There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats.
  4. Install an Anti-Spyware Program - Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. These programs can be used to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. The 4 program that we recommend are AVG Anti-Spyware, Spybot - Search and Destroy, and Ad-Aware, and Windows Defender.

A tutorial on using some of these programs can be found below:

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer
Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  1. Commercial Spyware Removal/Protection Programs - If you feel more comfortable installing a commercial Spyware removal program then we recommend WebRoot's Spysweeper or Lavasoft's Ad-Aware Professional. Both are excellent products and a worthy addition to the arsenal of software protecting your computer.

Spysweeper Product Information

  1. Occasionally Run Online Virus Scans - Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Two online scanners that I recommend are:

    http://www.kaspersky.com/virusscanner
    http://housecall.antivirus.com/


    Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software.
  2. Visit Microsoft's Windows Update Site Frequently - If you are a Windows users you must visit http://www.windowsupdate.com regularly. This site is a Microsoft site that will scan your computer for any patches or updates that are missing from your computer. It will then provide a list of items that it can download and install for you. When visiting the site, if it asks if you would like to install the Windows Update software, allow it to do so and it should only ask you to do this once. When the site is loaded you should then allow it to check for new updates and download any that it finds. If it has you reboot your computer, reboot and when your back at the desktop visit the site again and check for new updates. Repeat this process until there are zero critical updates available. This will ensure your computer has all of the latest security updates available installed on your computer and is secure from any known security holes.
  3. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. You may say "Why do I need a firewall?" I have all the latest updates for my programs and operating system, so nobody should be able to hack into my computer". Unfortunately that reasoning is not valid. Many times hackers discover new security holes in a software or operating system long before the software company does and therefore many people get hacked before a security patch is released. By using a firewall the majority of these security holes will not be accessible as the firewall will block the attempt.

  1. Install SpywareBlaster - Many known malicious programs are ActiveX programs that integrate into Internet Explorer. If you use Internet Explorer, then we recommend that you download and install SpywareBlaster. This program will load a huge list of known malicious programs into your computer's configuration and make it so that you can not run these programs on your computer and therefore become infected.

  1. Update your security programs regularly - As always if you do not update your programs, your programs will not be able to find the newest infections that may be racing around the Internet. It is therefore important that you upgrade the software and spyware/virus definitions for a particular program so that they are running the most effectively.
  2. Switch to another browser, like Firefox, or make your Internet Explorer more secure - The latest version of Internet Explorer is now shipped with much more secure settings. Or either make Internet Explorer more secure or switch to another browser like Mozilla Firefox. It's an excellent browser and is secure right after installing it. I used this one in my gear.


    If you decide you would rather continue to use Internet Explorer , then follow these steps to make it more secure:
    1. From within Internet Explorer click on the tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.

      1. Change the Download signed ActiveX controls to Prompt
      2. Change the Download unsigned ActiveX controls to Disable
      3. Change the Initialize and script ActiveX controls not marked as safe to Disable
      4. Change the Installation of desktop items to Prompt
      5. Change the Launching programs and files in an IFRAME to Prompt
      6. Change the Navigate sub-frames across different domains to Prompt
      7. When all these settings have been made, click on the OK button.
      8. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    1. Next press the Apply button and then the OK to exit the Internet Properties page.

By following all these steps you are sure to keep your computer at minimal risk to future infections or hack attempts. This is unfortunately not a fool proof method of securing your computer as new risks are released almost every day, but your susceptibility to these attacks will be diminished greatly.