Wednesday, August 31, 2011

Indian Numerology

According to Indian Numerology, each of us has three numbers that are the most relevant:


Psychic Number :
The psychic number reveals the way you look at yourself. It is what you really want to be and what defines your basic character. It represents your basic predispositions and talents that lead you to interact daily in a particular way.
The psychic number is obtained by making a single whole number (from 1 to 9) of the day of the month on which you were born. For example, Harish Johari was born on May 12th, and since 1+2=3, his psychic number is 3.
Destiny Number :
The destiny number indicates how you are viewed by the world and is related to your samskaras - vibrational patterns acquired by past actions, or karma. It is also the you that other people see, especially if they do not know you very well. And as you learn the lessons in this life you will tend to take on more of the characteristics of your destiny number.
Although both psychic and destiny numbers are important throughout life, between the ages of thirty-five and forty the psychic number recedes in influence while the destiny number becomes more significant.
The destiny number is the single whole number obtained by adding up the date, month, and year of birth. Harish Johari was born on May 12, 1934, so 5 + 1 + 2 + 1 + 9 + 3 + 4 = 25 ... 2 + 5 =7. Thus, his destiny number is 7.
Although they are relatively easy to calculate, you may use our Online Calculator for Psyche and Destiny Numbers to get them fast.
Name Number :
The name number is most important in your relationships with other people and you can have more than one name number if people are addressing you with different names. Changing your name and thus your name number may enhance certain qualities of your psychic and destiny numbers or avoid conflict between them.
Since name numbers are more difficult to calculate, with each character creating sound frequencies that relate to a particular number, you will find our Online Calculator for Name Numbers very handy.

Friday, August 26, 2011

Your Traces On The Internet

YOUR TRACES ON THE INTERNET


YOUR TRACES ON THE INTERNET

Firefox, Internet Explorer and Chrome aim to give their users total privacy. if they do manage it , how anonymous you really are on the Internet.

 
Browsers were considered perfect for years, when they displayed websites quickly and in an organised manner and could put forth all kinds of add-ons. Since then, they have become the standard, but the users demand a new aspect: more privacy. That’s why Internet Explorer 9, Chrome 10 and Firefox 4.0 have installed all the new protection functions that promise anonymous surfing. We observed the stealth functions of three browsers closely and we’ll show you what they bring, what kind of protection they offer, and where they fall short.
Irrespective of how well Firefox blocks cross-page tracking services with its new features, the browser always divulges a certain part of the information about the user and he/she cannot protect himself/herself against it. Even cover-up tools like Tor are of no help here. You will find a complete list of all the data that a tracking service knows about you on the following page.

Anti-tracking: Better data protection
The new tools are neither classic anonymous services which divulge IP addresses, nor Web blockers like the Firefox plugin Adblock Plus, which displays websites without advertisements. This would also not be in the interest of the browser manufacturers. Google’s business model is based on advertising, and even Microsoft Advertising is a successful advertising marketer. This makes it clear that manufacturers themselves do not spoil the market.
Nevertheless, browser developers promise that the advertisements should no longer be user-related. The tools prevent behavioural targeting, which affects advertising enterprises, who tailor ads to the user’s surfing behavior. If, for example, a person views a specific product at an online store, this product is again displayed on other pages. The power of repetition is designed to convince the user to buy.
This can be helpful in some cases: If the dealer reduces the price of the product, the user is directed to other pages. However, there are disadvantages. On one hand, there is uncertainty, which comes with collected data. On the other hand, while surfing, even users do not want to look over their shoulders within their own four walls. If a user shares the PC with his partner and looks online for a birthday gift, the surprise would be spoiled if the intended gift is shown on every page before he even buys it.
With the tools offered by the browser manufacturers, each user should be able to decide how much he/she wants to reveal about himself/ herself and if he/she wants to have a personalized advertisement.
For the latter, Google has a solution at hand: someone who wants an explicitly personalized advertisement can request that via ‘google.co.in/ads/preferences’. For this, the user does not need a Google account. The opportunities to remove individual advertisements have been around for quite a long time. Besides add-ons for browsers, big advertisers offer an ‘Opt-out’ opportunity on their websites. If the user clicks on the corresponding button, he/she receives the cookie, where upon he/she is not tracked anymore. The tick shows that it also removes the anti-tracking cookies, when it deletes all the cookies on the browser function. After that, the advertisement is personalized again. The manufacturers want to offer better adjustment possibilities than the Web advertisers, with new browser features and add-ons. With this, each program proceeds and succeeds differently.

Firefox: Signals in the header
Mozilla protects its users with the ‘Do Not Track’ application, which the company has designed in Firefox 4.0. This functions on the ‘Opt-out’ principle. A person may sign out if he/she does not wish to be tracked.
If the function is activated, the site operator receives a message that the user wants to remain anonymous.
This is how it functions technically: Each time a site is called up, a header is also sent with it. ‘Do Not Track’ follows this signal there. There are no lists in which the user can register himself/herself. On the contrary, the process can be compared with the ‘Please do not insert any advertisement’ tag on inboxes with the addition ‘I would like to stay anonymous’.
EVALUATION: The user can paste this tag on his/her browser, but he/she has little control over whether the site operator really pays attention to that. Ultimately, a click tracker does run in the background. Experts agree on one thing: As long as there is no globally applicable rule which demands that all services follow the user's request, the user can only hope that the tracking services are honest.
Even Mozilla developer Michael Hanson does not see the ‘Do NotTrack’ header as a solution for all the data security problems, as the browser reveals a lot about the users. However, it is a step in the right direction: If a user is not expressly tracked, the boards of control would have evidence, if the advertiser has ignored the signal.
ALTERNATIVES: The NoScript add-on takes care that not only are advertisements blocked, but the unwanted scripts and plugins are also removed. The JonDoFox extension sets up an anonymous profile, which you can use if you wish to remain incognito.

Internet Explorer: Pixel search
Even Microsoft offers the user a magic hood in Internet Explorer 9, with which he/she no longer gets tracked. In the previous version, there was a similar function called ‘InPrivate Filtering’. Redmond has just renamed it to ‘Tracking Protection’ and made it slightly more detailed.
There are two different modes: In the first mode the browser checks if the contents of other providers are on surfed websites. For example, Tracking Pixel tracks what the user is surfing. At the same time, the browser checks how often this pixel attaches itself to the latest searched sites. If the pixel pops up more than ten times (the frequency is determined between three and thirty), it is blocked.
It is highly likely that it concerns a service, which tracks the behavior or fades in the user-defined advertisement. The add-on even blocks measuring services like Google Analytics or IVW as well as the personalized advertisement. The longer the user surfs, the more extensive the list becomes. According to Microsoft, the data remains on the PC and is not sent to Redmond.
The second possibility: The user can subscribe to lists of external providers. Microsoft does not offer any lists, but the format is open, so that the youth protection organizations can make the lists available. Find more information at ‘ie.microsoft.com/testdrive’.
EVALUATION: The Microsoft security functions safely because the contents of every third site in the browser are blocked. Despite that, the software giant offers a peek at the lists and takes care of transparency, which is exactly what is blocked. Bonus: Each user can simply edit the lists and then include specific services if they cross their limits.
The subscribed lists with providers should be blocked, but still have a tick mark: If the providers change the tracking module of the URL, then accessing the list is of no use. Someone who wants to play it safe should look for providers on the white lists; they are more restrictive.
ALTERNATIVES: There are no extensions for the Microsoft browser. That’s why users can protect the private space simply in IE using Windows tools by generally deactivating cookies under ‘Internet Options | More’ or automatically delete them after a session.

Chrome: Add-on for privacy
The search engine giant Google also offers its users a solution, which supposedly blocks the user-specific advertisement that the user receives. Companies following the self-regulation programs of the Web industry (aboutads.info) no longer show any personalized advertisements after installing the ‘Keep My Opt-Outs’ add-on.
According to Google, majority of the advertising companies using behavioral targeting follow the program. Only a small fraction has not included itself in this.
EVALUATION: Until now, only US companies followed the agreement; Indian and European companies do not support this. Due to this, there is no guarantee that no personal advertisement will be shown. For example, when a user is not tracked by Google Analytics service, it is intended that Google only deals with advertisement. A Chrome user can block the cookies of another provider in the browser settings under ‘Options | Content Settings | Cookies’.
ALTERNATIVES: You can hide the Google Analytics service very easily with an add-on, which originates from Google. There is the Google Opt-out extension for Firefox, Internet Explorer and Chrome under ‘tools.google.com/dlpage/gaoptout.’
Though Google Analytics continues to track the surfer, the tool blocks the entire IP address form being sent. This way the site provider cannot track the user’s location. The NOREF add-on takes care that no referrer is sent.

Fact: Less protection
The Firefox tools and Chrome prevent the pop-up of personalized advertisements only to a certain extent. Only Microsoft’s Tracking Protection delivers protection even though it dos not entirely stop tracking the user.
Lastly, the process of all browsers is meant to be good, but when a service wants to really analyze and track the user, it can still do it.
There are still plenty of opportunities to identify the user. If the surfer, for example, activates the JavaScript, the site operator can create a profile in which he/she can read all the fonts installed on the computer. Deactivating JavaScript not only decreases the convenience and user-friendliness on many sites, as menus or other effects are often animated with it, but it would also stops protection against tracking entirely. Even Cascading Style Sheets trickle out webmaster information from the browser. Thus, it can track and find mouse movements, as to how you navigate on the site. Absolute anonymity still remains wishful thinking. 

 

All the privacy tools fail here
Anonymous on the Internet? Just for the sake of it. Modern browsers divulge so much information, that each user can be clearly recognized. Even if the user hides himself/herself using cover-up services, there are privacy loopholes. We show you these and tell you how to block them.

 SIZE OF THE BROWSER WINDOW
Even when JavaScript is deactivated, a person can choose the size of the browser window directly using Cascading Style Sheets. CHIP says: Only standard sizes should be transferred.

 Cookies
There are no cookie adjustment options which suffice all the data security requirements without limiting its functionality. Cookies are partly deleted automatically, but only after the end of the session. CHIP says: The browser should remove them right after switching to the next site.

 COMPUTER TIME
Pages can choose the local time of the PC on the Date()-object using JavaScript, lock the time zone at the location and even assess it, whether the user surfs privately or professionally. CHIP says: A user should be able to fake the Date()-object, so that the time shown on each website is different.

 FONTS
You can install fonts using Flash, Java, JavaScript or CSS to relate to the PC. CHIP says: The user must be able to configure the browser fonts and ideally be able to restrict them to the standard fonts. The user does not really have any disadvantages, as most of the sites use standard fonts.

 PLUGINS AND FILE TYPES
You can analyze and check plugins up to the version number using JavaScript to check which file types are feasible. All this is not really required for running these pages. CHIP says: A message, whether Flash is installed, is sufficient.

 MOUSE MOVEMENT
Sites can track the mouse movement with CSS and JavaScript. CHIP says: The user should accept that the behavior is being tracked. However, few sites function only when the user releases the mouse.

 HTTP SIGNATURES
The browser type can often be easily recognized using the HTTP signatures. CHIP claims: The sequence of the header data sent should be adjustable.
 
What does the private mode really do?
All the common browsers include a private mode. Unlike the Anti-Tracking-Tools, they deliver protection if the user shares the computer with other people. Search hits, browser actions and passwords are not saved. Even the cookies are cleared automatically, which makes it impossible for the tracking services to spot the small text files on the computer for a longer time. Nevertheless, the site operators create the user profile in private mode and recognize the user. As the information is deleted only after ending the browser session, a tracking service can easily access all the information during the session.

The disadvantages of online anonymity
Someone who wants to be hidden on the Internet has to reckon with a few disadvantages: Besides the comfort features, which do not work with each other anymore, there may be problems in services, which use the surfing behavior as a distinguishing feature.

BROWSER AS A LOGIN KEY
Some paid services or online banks have hidden security mechanisms that the user does not notice. The provider may record the typing speed or the mouse movement and create a fingerprint of the user. If these features are other than the regular ones,  something like cover-up, then the user cannot login in such situations.

INTERVIEW
“Covering-up IP addresses is not enough”

How anonymous is a person on the Internet?
Not at all. The provider can track all the steps of the user on the access account. Even site operators, advertising and analysis services can track the user using the IP addresses.

Can a browser protect the private sphere?
Browsers would offer protection, had the Net users not been so different, that is to say, had they not been a large group of look-alike surfers. Then it would not have been technically possible to create the user’s profile and track it.

This does not sound as if it would work.
Modern web browsers send a lot of information using the operating system on visited websites. This data is often so distinct, that a computer can be clearly identified, if it changes its IP addresses often. The cookies mentioned often are only the tip of the iceberg.

Where are the additional problems?
None of the web browsers are independent of the operating system, especially so, when JavaScript is activated. No adjustable properties are provided in Flash and Java. There are no attachments for a browser or even for an anonymity-platform user profile.

What should the browser manufacturers change to offer genuine anonymity in the Net?
A good approach would be designing a standard, anonymous profile which can be activated as desired in each Web browser, possibly on the “private mode.

Thursday, August 18, 2011

Best natural oils for healthy skin

Best natural oils for healthy skin
Nature has bestowed upon us a number of essential oils that help revitalize and rejuvenate dull skin. However, with our hectic schedules, we're often unable to cater to our skin's needs. This leads to unpleasant dryness and flakiness that can cause itching and redness. But, step aside from extravagant parlors and spa centers, and take a look around. You will find that all your skin solutions are found in nature. Here are some essential oils that are the best skin rejuvenators. So let's take a look at how these natural oils can be beneficial for skin care. (Images courtesy: © Thinkstock photos/ Getty Images)


Coconut Oil: Need we really mention the health benefits of using coconut oil? Since ancient times, people have used this essential oil for nourishing their hair and fighting wrinkles. This is primarily due to the presence of essential proteins, lauric and capric acid in coconut oil. Besides this, it also helps strengthen the connective tissues of the skin, being a rich source of medium-chain fatty acids.


Olive Oil: The beneficial effects of olive oil on human skin are simply amazing. It feeds and nurtures the skin with many vital nutrients. Earlier, people used olive oil to heal wounds but nowadays, it is primarily used as an effective moisturizer to cure dry spots or stretch marks.


Argan Oil: For centuries, women have used argan oil to protect and nourish their skin, nails and hair from dry and rough conditions. Today, a number of beauty brands and cosmetic products make use of this oil as a vital ingredient for skin care. Premature ageing caused as a result of oxidation can be cured best by using argan oil which is a rich source of Vitamin E and fatty acids. It restores the skin’s hydro lipid layer and prevents the appearance of wrinkles on the skin. The oil also has healing properties in that it promotes scar healing and can also be used as a disinfectant and sun screen.


Jojoba Oil: Similar to argan oil, jojoba oil is a vital component of many beauty products. Its prime function in maintaining healthy skin is that it moisturizes and conditions the skin for a very long period. You can even use it as a cleanser and softner for your hair and skin. In case your scalp is sensitive to the application of any other nutrients, you can safely use this oil to prevent scalp dryness, soreness and itchiness.


Sweet Almond Oil: This natural magic potion contains vitamins like E, A and B complex which not only moisturize your skin but also protect against any visible signs of ageing. However, unlike jojoba oil, this variety of essential oils cannot be used by those who are allergic to nuts. Hence, it is advisable to perform a pre-test procedure prior to the application of the oil. Apart from skin, you can also use this oil to provide nourishment to your skin. The correct way of application is by gently massaging the scalp for 5-10 minutes and then gradually rinsing with plain water.


Grapeseed Oil: This is perhaps, one of the most preferred essential oil due to its light and non-greasy nature. Easily available, Grapeseed oil can be used to condition the hair and scalp. It also protects the skin from premature ageing and accumulation of free radicals.

Thursday, August 11, 2011

Easy ways to increase YOUR take-home pay

Easy ways to increase YOUR take-home pay

It is a common question that always hovers on a salaried professional's mind. Given the fixed amount of salary, what all you can do to increase the net take home amount? Is it really possible at first place?Everyone could do with a little extra money but how do you get there? am22tech.com lists out simple ways to do it
Well, there are multiple options available for you to increase your take home given the fixed CTC or gross income and all options point to only one direction i.e. REDUCE TAXES! So, we will talk about options available to you WRT to saving taxes.
The very first step in doing this is to understand what is meant by a CTC. If you know the various components included in your CTC, you can very well use them to your benefit.
Please note that there is a difference between the CTC amount and take home salary amount. You cannot simply assume your monthly take home to be (Yearly CTC)/12.


Define your take-home salary

Take-home pay = Direct Pay Out - Income tax - Employee PF - Other deductions, if anyDefine your take-home salary
There are two primary ways of reducing taxes are (If you keep the CTC amount fixed):
1. Restructuring the CTC components
This method involves including maximum amounts of tax saving components like Medical allowance, converyance allowances etc. and reducing the allowances, which do not attract any tax rebates.
2. Make FULL use of tax saving components
Obviously, the only way a salaried person can increase his take home is to maximise his tax rebates and pay as less tax as possible.
Reducing taxes is exactly what a businessman does to increase his profit and take home money. Income tax laws in India give ample of options for a businessman to save tax by allowing all the expenses with no limits to carry on his business.
Salaried person also has some options but only to a certain extent. So, I would advise you to make FULL use of these options and take away more in your pocket!!


Common tax saving options

Can you drive to your office in Rs 800 per month given the soaring prices of fuel in our country? Well, Indian government feels that you can.Conveyance Allowance
They only allow you to get the tax rebate of Rs 800 per month for earning the salary. They still feel that the fuel prices are same for a salaried person as they were at the time of writing down income tax laws.
So, please do ask yourConveya employer to include this component in your CTC, if he has not done so.
You are not required to furnish any bills/receipts to get this benefit. Hence, any amount lesser than Rs 800 per month is a wasted opportunity to increase take home pay.

House Rent Allowance (HRA)



The tax rebate that you get on HRA is dependent of three clever rules of rules Income tax based on your basic salary, the actual rent you pay and your city of residence in India.The most common component of your salary package is HRA. This is meant to give you tax rebate if you are staying in a rented house. HRA amount is calculated as a percentage of Basic salary (40-50%).
Unfortunately, our government feels that there are only four Metro cities in India i.e. Chennai, Delhi, Mumbai and Kolkata.
So, people living in these cities are eligible to get 50% of tax rebate leaving others to get only 40%.
Also, note that Rent paid = HRA received does not give you maximum amount of tax rebate. If you want to maximise the tax exemption, you should know how to hack these rules.
If you stay in your own house belonging to your parents, you can still claim HRA by paying the rent to your parents.
But, this rent would certainly be added to your parent's taxable income. This trick is helpful if they don;t have any other source of income. You can certainly save huge tax liability if you can do this.
If you are claiming tax benefit on home loan, you can still claim HRA. You need to provide documents to prove that your own home (on which you have taken home loan) is not occupied by you as it is far away from your office and you are staying in a rented house near your office.

Medical Allowance

This includes you dependents i.e. spouse, children and dependent parents.You are allowed to claim up to Rs 15,000 as tax rebate for any expenses made on medical expenses in a year.


Telephone Allowance

Of course, this is an amount which you would have spent even if it was not reimbursed but after paying an income tax.Some companies do reimburse the telephone or mobile bills incurred by you. This amount becomes non-taxable for you if they reimburse it to you on actual bill amount.


Food coupons


Income tax rules mentions meal allowance through meal vouchers can be provided up to Rs 50 per meal during working hours.This allowance is given in the form of coupons, which are meant to be spent on eating meals in office time. You can save good amount of tax if you can get food coupons for maximum number of days in a month.
Assuming that any employee would consume at least two meals during work hours (breakfast and lunch or evening snacks and dinner), and hence at the rate of Rs 50 per meal and Rs 35 for tea and snacks, the company could provide Rs135 per working day as the maximum allowance to the employee.
Hence, if you opt for Meal Vouchers @ Rs. 135/- (Rs 50 per meal x 2 + Rs 35 for tea and snacks) per working day, instead of cash in your salary, you can save huge amount of tax Rs. 42120 (Rs 135 x 26 days x 12 months) as per your tax slab.


Make full use of investments tax rebate


Investing is a good habit and helps you save tax resulting in increased take home. Total allowed amount is Rs 1 lakh per annum + Rs 20,000 reserved for investment in Infrastructure bonds (year 2011-12).You are allowed to claim tax rebate when you invest money in long term savings like insurance policies, mutual funds etc.


Voluntary Provident Fund (VPF)


VPF is a voluntary amount that you contribute to your provident fund every month. This amount is fully tax exempted and hence reduces your taxable income.Though this does not offer a direct increase in your take home pay, it certainly reduces your tax and brings more money on your side.


Leave Travel Allowance (LTA)

This allowance is taxable if you do NOT travel or travel but do not claim. So, why miss the chance of saving tax?You should submit your bills to claim tax benefit on a leisure travel with your family.


Claim tax benefit on home loan



This is a substantial amount and you SHOULD provide the relevant proofs to claim the tax benefit.Did you know that you could reduce your taxable income upto Rs 2.5 lakh on your home loan repayment? Yes, the principal amount is tax deductible up to Rs 1 lakh and loan interest up to Rs 1.5 lakh per annum (year 2011-12).

Monday, August 1, 2011

Has human mind reached limit of its intelligence?


Has human mind reached limit of its intelligence?


The human mind may have reached its limit of intelligence, as a research has suggested that the humans are presently as smart as they are ever going to be. Scientists have said that even the cleverest people might not get any brighter since our grey matter has stopped evolving. And it is all down to physics. The structure of our brain and how much energy it uses are key to the theory. Text: IANS Photo: Getty Images

Theory of constraints

One part of the theory is that scientists reckon brain cells cannot get much smaller than they are at present - meaning there will not be any further space for more of them. It is also thought the number of connections between brain cells cannot rise much more due to the amount of energy they consume. Research has shown that the better connected the parts of the brain, the higher a person's IQ. Text: IANS Photo: Getty Images

Limiting energy consumption

The theory's another part is the amount of energy used by brain cells. It states that the brain only accounts for two percent of a person's body weight - but uses 20 percent of our overall energy. It means if we turned any smarter - by having more brain cells or connections between them - the impact on our body's power supply would be immense. "We have demonstrated that brains must consume energy to function and that these requirements are sufficiently demanding to limit our performance and determine design," said Simon Laughlin, professor of neurobiology at Cambridge University. Text: IANS Photo: Getty Images

The grid logic

According to Ed Bullmore, professor of psychiatry at Cambridge, all of us have "to pay a price for our intelligence". "Becoming smarter means improving connections between different brain areas but this runs into tight limits on energy, along with space for the wiring," Bullmore said. Text: IANS Photo: Getty Images

Evolution is subject to the ecosystem

Laughlin also feels the brain evolution could go into reverse if human circumstances change - for instance if there were a shortage of food. He said: "The fact that brains both expand and contract during evolution shows that the optimum balance changes with circumstances." Text: IANS Photo: Getty Images

How hackers hijack your Facebook photos

LONDON: Beware of uploading your pictures onFacebook -- as an Indian origin computer scientist has warned that by doing this you could be helping someone to steal information from your computer. 

The scientist created a botnet called Stegobot to show how easy it would be for a crook to hijack Facebook photos to create a secret communication channel that is very difficult to detect. 

Like most botnets, Stegobot gains control of computers by tricking users into opening infected email attachments or visiting suspect websites. But rather than contacting the botmasters directly, it piggybacks on the infected user's normal social network activity. 

"If one of your friends is a friend of a friend of the botmaster, the information transfers hop by hop within the social network, finally reaching the botmasters," New Scientist quoted Amir Houmansadr, a computer scientist at the University of Illinois at Urbana-Champaign who worked on the botnet, as saying. 

Stegobot takes advantage of a technique called steganography to hide information in picture files without changing their appearance. 

The botnet inserts this information into any photo you upload to Facebook, and then waits for one of your friends to look at your profile. They don't even have to click on the photo, as Facebook helpfully downloads files in the background. If your friend is also infected with the botnet than any photo they upload will also pass on the stolen data. 

From there, the data will eventually make its way to the account of someone who is also friends with the botmaster, allowing them to extract details on your identity. The botmasters can also send commands to the botnet through the reverse process - uploading a photo with hidden instructions that make their way to infected computers. 

"It's scary because it's virtually undetectable," said Shishir Nagaraja of the Indraprastha Institute of Information Technology, New Delhi, India, who led the project.