Feng Shui: Most prosperous year is 2009

Wednesday, December 31, 2008 at 8:59 AM

Feng Shui: Most prosperous year is 2009

(Agencies)
Updated: 2008-02-07 10:04

The Year of the Mouse threatens to see a build-up of international tensions, natural and air disasters, and a more turbulent stock market, soothsayers and analysts say.

As the Year of the Pig ends, followers of Chinese feng shui will be scurrying to consult fortune-tellers, astrologers, feng shui geomancers to guide their year ahead.

Chinese fortunes are based on a belief that events are dictated by the different balances in the elements that make up the earth -- gold, wood, water, fire and earth.

Feng shui master Raymond Lo says this year will see the earth element sitting atop water, suggesting an outward solidity built on sliding foundations.

"The earth on top is Yang earth which symbolises a mountain, and mountain gives a sense of stability and firmness. But such floating earth in the ocean is weak in foundation and the stability appears to be fragile," Lo said.

"This elemental relationship will bring a year which apparently is more stable but there are a lot of underlying tensions and confrontations."

Lo added that the Chinese calendar follows a 60-year cycle, so 2008 will be similar historically to 1948, when Israel was established and the blockade of Berlin started, both events part of the build-up to long-standing conflict.

The lunar calendar is based on the cycles of the moon and associates each of the 12 years forming a partial cycle with an animal. Fortune-tellers base their predictions on the relationship between the zodiac animals and the characteristics of each.

The Mouse is the first of the 12 animal signs, so marks new beginnings, which Lo said will be reflected in changes of leadership in the United States and Russia.

It is followed by ox, tiger, rabbit, dragon, snake, horse, goat, monkey, rooster, dog and pig.

The rodent is also seen as a "flower of romance" which means the year will stimulate romance, but also sex scandals.

More worryingly, it provokes a clash between water and fire which could mean heavy flooding or a tsunami, Lo added.

"The most famous water disasters in history, such as the south Asian tsunami in 2004 and the sinking of the Titanic in 1912, both incidents happened on a date with prominent appearance of the Mouse," Lo said.

He also said that the previous Year of the Mouse, 1996, witnessed more than 20 plane crashes including the Trans World Airlines Boeing aircraft which exploded over the Atlantic, killing 230 people.

Lee Sing-tong, a third-generation feng shui master, said China may suffer a water shortage in the next 12 months.

But after the property bubbles in the US and China's tightening monetary measures, Lee believes the US and China property markets will enter another chapter and will see stable development.

Although the subprime crisis has caused concerns in the global economy, unexpectedly the property market will stabilize in 2008.

He predicts a better economy for China after the 2008 Olympics. "2009 will be its most prosperous year in history," he added.

Kenny Lau, head of the small-cap sector at Credit Suisse, said the last three Mouse years had all seen very strong stock market growth in Hong Kong. It grew 232 percent in 1972, 30 percent in 1984 and 18 percent in 1996.

But he said high inflation -- he predicted 5.1 percent in Hong Kong and 6.5 percent in the Chinese mainland -- would provide a threat to economic growth and turbulent times were ahead.

His colleague Vincent Chan, head of China research, said the markets will not repeat the record returns of the past few years.

"It is likely that the volatility of the market in 2008 will be comparable to that of 2007, but the chance of significant absolute returns is rather remote," he said.

2009 Anti Virus Software Rankings

Thursday, December 18, 2008 at 6:32 PM

BitDefender Antivirus 2009

Manufacturer: SOFTWIN
Version: 2009


Kaspersky Anti-Virus 2009

Manufacturer: Kaspersky
Version: 2009


Webroot Antivirus 6

Manufacturer: Webroot Software
Version: 6


ESET Nod32 3

Manufacturer: Eset
Version: 3


AVG Anti-Virus 8

Manufacturer: AVG Technologies
Version: 8


Vipre Antivirus + Antispyware

Manufacturer: Sunbelt Software


F-Secure Anti-Virus 2009

Manufacturer: F-Secure Inc.
Version: 2009


Trend Micro AntiVirus with AntiSpyware 2009

Manufacturer: Trend Micro
Version: AntiVirus with AntiSpyware 2009

McAfee VirusScan 2009

Manufacturer: McAfee, Inc.
Version: 2009


Norton AntiVirus 2009

Manufacturer: Symantec Corporation
Version: 2009


CA Antivirus 2009

Manufacturer: Computer Associates
Version: 2009


Norman Antivirus and Antispyware 5.81

Manufacturer: Norman
Version: 5.81


Panda Antivirus Pro 2009

Manufacturer: Panda Software
Version: Pro 2009


AVAST! 4.8

Manufacturer: Alwil Trade Ltd.
Version: 4.8


PC Tools AntiVirus 5

Manufacturer: PC Tools
Version: 5


F-Prot 6

Manufacturer: Frisk Software International
Version: 6


ViRobot 5.5

Manufacturer: Hauri
Version: 5.5



The World's Worst Viruses

Thursday, December 11, 2008 at 4:03 AM

1. Love Hurts

LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems.

2. Klez the Conquerer

The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection.

3. Malevolent Melissa

The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.

So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants.

4. Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy.

5. (Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.

6. Tennis Anyone?

The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants.

7. Numbing Nimda

Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern

8. Bad Benjamin

Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive

9. Red Raider

Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.

10. Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish.

Trash Chronicles | Powered by Blogger | Entries (RSS) | Comments (RSS) | Designed by MB Web Design | XML Coded By Cahayabiru.com