Precautions while using social networking sites

What are social networking sites
1. Social networking sites, sometimes referred to as friendofafriend sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections. Although the features of social networking sites differ, they all allow you to provide information about yourself and offer some type of communication mechanism (forums, chat rooms, email, instant messenger) that enables you to connect with other users. On some sites, you can browse for people based on certain criteria, while other sites require that you be introduced to new people through a connection you share. Many of the sites have communities or subgroups that may be based on a particular interest. .....
What security implications do these sites present
2. Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because 1the internet provides a sense of anonymity. 2The lack of physical interaction provides a false sense of security. 3they tailor the information for their friends to read, forgetting that others may see it. 4they want to offer insights to impress potential friends or associates. While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information thats available. The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data. .....
Limit the amount of personal information you post
3. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your connections. .....
Remember that the internet is a public resource
4. Only post information you are comfortable with anyone seeing. This includes information and photos in your profile and in blogs and other forums. Also, once you post information online, you cant retract it. Even if you remove the information from a site, saved or cached versions may still exist on other peoples machines. .....
Be wary of strangers
5. The internet makes it easy for people to misrepresent their identities and motives. Consider limiting the people who are allowed to contact you on these sites. If you interact with people you do not know, be cautious about the amount of information you reveal or agreeing to meet them in person. .....
Be skeptical
6. Dont believe everything you read online. People may post false or misleading information about various topics, including their own identities. This is not necessarily done with malicious intent; it could be unintentional, an exaggeration, or a joke. Take appropriate precautions, though, and try to verify the authenticity of any information before taking any action. .....
Evaluate your settings
7. Take advantage of a sites privacy settings. The default settings for some sites may allow anyone to see your profile. You can customize your settings to restrict access to only certain people. However, there is a risk that even this private information could be exposed, so dont post anything that you wouldnt want the public to see. Also, be cautious when deciding which applications to enable, and check your settings to see what information the applications will be able to access. .....
Use strong passwords
8. Protect your account with passwords that cannot easily be guessed. If your password is compromised, someone else may be able to access your account and pretend to be you. Limit usage of social networking sites to personal use only. Do not write about work issues. Always assume everyone in the world will be able to see what youre writing even if the site limits your post to your friends exclusively. .....
Check privacy policies
9. Some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam. Also, try to locate the policy for handling referrals to make sure that you do not unintentionally sign your friends up for spam. Some sites will continue to send email messages to anyone you refer until they join. .....
Use and maintain anti virus software
10. Antivirus software recognizes most known viruses and protects your computer against them, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date. .....
Limit usage of social networking sites
11. 1. Limit usage of social networking sites to personal use only. Do not write about work issues. Always assume everyone in the world will be able to see what youre writing even if the site limits your post to your friends exclusively. Do not log on to your social network page from public computers such as internet caf .....
Personal is personal
12. To start out with, the precautions to take when practicing online social networking is to keep your personal information personal. This means that any information that will identify you as a real persona and not just a name on the computer. This is your personal information and should not be posted on social networking sites. The information like your full name, your physical address and the routines you have made in you life should be kept away from online social networking. .....
Limit viewers
13. While you are limiting the information you post on social networks, you will need to take the precaution of privacy policies when social networking. There are social networks that have very strong privacy setting. Use those setting and make sure that only your friends, people that you personally know, can get to what you post. Also if new people want to be your friend, use great caution. .....
Make sure they are friendly friends
14. The precautions you need to take when you are practicing online social networking are extremely crucial when dealing with strangers, or new friends. When you get a new friend request you need to be very careful. This may be an innocent person who is very honest, but it could be a predator looking to steel you identity of give your computer a virus. You should always scan these emails and any attachments they have before opening them. Always have your firewall on the highest you can to help prevent predators from getting to your information. .....
What stays posted
15. Another precaution to take when practicing online social networking is to limit what you say or post. When you put something, whether it is written word or pictures or whatever, you will want to only post what you wont mind millions of people seeing. Online social networking is not your personal diary. Millions of people can get access to what you post. And what you post will stay online forever. You may delete it, but it has most likely gone on someone elses computer and they will have the ability to put it online again. It never comes off. .....
Who would want my photo
16. One precaution to take to help prevent others from taking your photo is to distort your photos a little bit. You can do this by adding a little fuzz or smearing the photo a little. You dont want your photos to be used by anyone you do not know. .....
Family and friends
17. Also use precaution when you post something about your friends and family when you are practicing online social networking. You should always have your families and friends permission before you post anything about them or any pictures of them. You want to use precautions with yourself and those you are involved with when online social networking. .....
Dont post your address online
18. Dont post your address online. If someone has your full name and knows the area where you live, they can find you online. If they can figure out when youll be gone, youre inviting disaster. Try to avoid mentioning where you work; so that if you mention something you thought innocent (but that might be valuable information for hackers) they will not know who to target. .....
Dont identify your friends names
19. Dont identify your friends names to others on a social networking site. This may make them future targets for a criminal or terrorist act. Do your friends a favor and keep them anonymous. Be wary of what youre posting, if you use your pets name as a password anywhere do not post about it on your social networking sites naming it. .....
Keep some things a secret
20. Dont provide a minute by minute account of your day. Keep some things a secret. Telling the world where you are and what youre doing can be used to predict where youll be in the future. If you re excited about an upcoming vacation, keep it to yourself. Criminals use this information to determine the best time to rob your home. .....
Do not check in to different locations
21. Do not check in to different locations. Many social media sites offer incentives for visiting certain places and posting your whereabouts online. Keep in mind every time you do this, you tell anyone watching exactly where you are and how far you are away from home. .....
Remove any geotagging dat
22. Remove any geotagging data from your smart phone, iPhone or Blackberry. Your smart phone may have this function without your knowledge. There are numerous online websites that help you do this for your phone. Just search online to find one. .....
Remove any pictures with location data
23. Remove any pictures with location data of you and your family. Pay specific attention to those pictures near and around your home, and places that you regularly visit. Many cell phones and iTouches automatically tag each photograph taken with the location of the picture. When downloaded onto social networking websites, these locations can reveal where you live and work, and identify other members of your family. .....
Main precautions
24. There are many precautions to take when you are practicing online social networking. Some of the precautions to take are, make sure you keep your personal information personal, also limit the viewers you have to your posting. You will need to be sure and set your privacy setting so that only friends can access your postings. Be careful with new friends, and post only what everyone you know, and a few million you dont know, can see. Take precautions with photos and what you say or post about family and friends. If you take these precautions when you are practicing online social networking you can have a safer and better time online. .....
Check your social media pages regularly
25. Check your social media pages regularly. If there are any postings showing inappropriate behaviour, such as drunkenness, remove them immediately. If what you see concerns you, then investigate it. Do not automatically trust that posts are from who they claim they are; if your workmate sends you a private message asking for some confidential information first verify that he/she did really send you that message as their account might have been compromised. .....
Google your own premises and check the results
26. Google your own premises and check the results. Set up Google and Twitter alerts (the latter on TweetDeck) with the name of your premises so that you can keep up to date with new developments. If an event at your premises is promoted on a social media site, ensure that you control the guest. .....
Use caution when you click links
27. Use caution when you click linksthat you receive in messages from your friends on your social website. Treat links in messages on these sites as you would links in email messages. (For more information, seeApproach links in email with cautionandClick Fraud: Cybercriminals want you to like it.) .....
Know what youve posted about yourself
28. Know what youve posted about yourself.A common way that hackers break into financial or other accounts is by clicking the Forgot your password? link on the account login page. To break into your account, they search for the answers to your security questions, such as your birthday, home town, high school class, or mothers middle name. If the site allows, make up your own password questions, and dont draw them from material anyone could find with a quick search. .....
Dont trust that a message is really from who it says its from
29. Hackers can break into accounts and send messages that look like theyre from your friends, but arent. If you suspect that a message is fraudulent, use an alternate method to contact your friend to find out. This includes invitations to join new social networks. For more information, seeScammers exploit Facebook friendships. .....
To avoid giving away email addresses of your friends
30. To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book.When you join a new social network, you might receive an offer to enter your email address and password to find out if your contacts are on the network. The site might use this information to send email messages to everyone in your contact list or even everyone youve ever sent an email message to with that email address. Social networking sites should explain that theyre going to do this, but some do not. .....
your personal bookmarks
31. Type the address of your social networking site directly into your browser or use your personal bookmarks.If you click a link to your site through email or another website, you might be entering your account name and password into a fake site where your personal information could be stolen. .....
Be selective about who you accept as a friend on a social network
32. Be selective about who you accept as a friend on a social network. Beware of what links you click and what software you download and install. Do not trust links/software sent by your friends implicitly as they themselves might not be aware it includes malware or their account might have been compromised. .....
Choose your social network carefully
33. Evaluate the site that you plan to use and make sure you understand the privacy policy. Find out if the site monitors content that people post. You will be providing personal information to this website, so use the same criteria that you would to select a site where you enter your credit card. .....
Assume that everything
34. Assume that everything you put on a social networking site is permanent.Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer. Do not send confidential information through a social networking site even if someone who has legitimate access to that information asks you to. .....
Be careful about installing extras on your site
35. Many social networking sites allow you to download thirdparty applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information. To download and use thirdparty applications safely, take the same safety precautions that you take with any other program or file you download from the web. .....
Think twice before you use social networking sites at work
36. For more information, seeBe careful with social networking sites, especially at work. Always be sceptical and wary. If someone asks to be friends on a social networking site and the profile appears to match a work mate, check personally with that person before accepting him as he could be an imposter. Also be sceptical of any offers or prizes you might have been told you won, they might actually be phishing attacks. .....
Talk to your kids about social networking
37. If youre a parent of children who use social networking sites, seeHow to help your kids use social websites more safely. Ensure your computer is up to date and has good antivirus protection; social networking sites are frequent targets of malware attacks. Never use the same passwords that you use at work on a social networking site. .....
Manage your digital footprint
38. First, make a list of all social networking sites, online services, and smartphone apps where you have an account. Google your full name (within quotes) and your email address to find accounts you might have forgotten about. Systematically, start closing the accounts and unsubscribing yourself from the services that you do not use any more. Try websites like AccountKiller.com, DeleteYourAccount.com and JustDelete.me for quick links and howtos. .....
click on the lock
39. In Facebook, click on the lock icon in the top right corner of the blue bar and change the settings to private, or share them only with close friends. Importantly, also disable the setting that lets search engines link to your timeline. There is currently a lot of M&A activity in the social networking software industry. A significant part of what an acquirer buys when acquiring a social networking company is the community of users on the site. Your account, including personal information, trades hands from the old company to the new one as part of the transaction. .....
Security and Privacy
40. Security and Privacy, choose the option Do not allow anyone to tag me in photos. Check the Protect my Tweets box so only people you approve can see them. Similarly, uncheck the Add a location to my Tweets box. Also, click the Delete all location information button to erase geotags from past tweets. Additionally, uncheck the Discoverability box that lets people find you by your email address. .....
Stop websites from tracking you
41. Its true, theyre watching you. Every time you surf the web .....
To avoid being tracked
42. Sign out of all your accounts before browsing websites, or using search engines. Uninstall search tool bars that you might have installed. Check the extensions that your browser is running (refer to the browser Help section to know more about extensions), and disable the ones that you dont recognize. .....
Useful browser extensions
43. Disconnect: Blocks trackers from popular sites (Chrome, Firefox, Opera, Safari) HTTPS. Everywhere: Redirects to secure (HTTPS) versions of sites where possible (Chrome, Firefox). Adblock Plus: Blocks intrusive ads (Chrome, Firefox, Opera, Safari). .....
Dont give optional information
44. 1. Dont give optional informationWhen creating a profile, you do not need to enter all of the information that is requested. The setup page usually requires you to fill out basic information, such as your name and email. Everything else is optional. Do not feel obligated to put your address and telephone number. .....
Third level of privacy
45. There are three levels of privacy settings to choose from for your profile. There is open to everyone, open to friends of friends and friends only. The best setting to use is the friends only setting on all of your privacy choices. Friends only is the strictest level of security; it only allows people that you have accepted as a friend to view information about you. .....
Accept only people you know
46. Accepting only people you know and trust is a great way to ensure safety when using social networking sites. Doing this can protect you from spammers, pedophiles, and other people who use social networking sites to commit crimes. .....
Be wary of thirdparty applications
47. Thirdparty applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Avoid applications that seem suspicious, and modify your settings to limit the amount of information the applications can access. .....
Keep software particularly your web browser up to date
48. Install software updates so that attackers cannot take advantage of known problems or vulnerabilities (seeUnderstanding Patchesfor more information). Many operating systems offer automatic updates. If this option is available, you should enable it. .....
Use and maintain antivirus software
49. Antivirus software helps protect your computer against known viruses, so you may be able to detect and remove the virus before it can do any damage (seeUnderstanding AntiVirus Softwarefor more information). Because attackers are continually writing new viruses, it is important to keep your definitions up to date. .....
Hacker
50. Someone who breaks into computers or computer networks and accesses a profile users information to get money or to break into other personal accounts. Some may also create false profiles or pose as another user. Privacy statements on sites like Digg discuss situations like this. The new owners may have new and different plans for using the information contained in the site. Changes in privacy policies may follow an acquisition. Watch for this when you hear about an acquisition and always read notifications about changes to privacy terms, acceptable use policies and user agreements. .....
Blocking
51. Prevents another user from searching and viewing your profile; you can ban access temporarily or permanently. It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldnt be a good idea as it could easily alienate your employees. The best course of action is to educate your employees. Below is a list of the top 10 security precautions an employee should keep in mind when using social networks. .....
Use caution when clicking a link
52. Use caution when clicking a link to another page or running an online application, even if it is from someone you know. Many applications embedded within social networking sites require you to share your information when you use them. Attackers use these sites to distribute their malware. .....
Be careful who you add as a friend
53. Be careful who you add as a friend, or what groups or pages you join. The more friends you have or groups/pages you join, the more people who have access to your information. Companies are looking for ways to prevent company confidential and proprietary information from slipping through the firewall. Most incidents probably occur via email or file transfers but IM chat tools, blog posts, Twitter messages and even online resume content could disclose proprietary company information. Even using social networking sites on company time or using company resources could be a violation of the companys acceptable use policy. Before you become the corporate poster child for some publically humiliating episode from using social networks at work, check your corporate AUP to make sure you arent violating the policy. .....
Use discretion before posting information
54. Use discretion before posting information or commenting about anything. Once information is posted online, it can potentially be viewed by anyone and may not be retracted afterwards. Keep in mind that content or communications on governmentrelated social networking pages may be considered public rec .....
Configure privacy settings
55. Configure privacy settings to allow only those people you trust to have access to the information you post. Also, restrict the ability for others to post information to your page. The default settings for some sites may allow anyone to see your information or post information to your page; these settings should be changed. .....
Review a sites privacy policy
56. Review a sites privacy policy. Some sites may share information such as email addresses or user preferences with other parties. If a sites privacy policy is vague or does not properly protect your information, do not use the site. If youve just joined a social networking site, or even if you have been a user for some time, log onto your account and view and adjust the privacy settings .....
confidentiality or an individuals breach of privacy
57. Information such as a persons social security number, street address, phone number, financial information, or confidential business information should not be published online. Similarly, posting photos, videos or audio files could lead to an organizations breach of confidentiality or an individuals breach of privacy. .....
Security and privacy related to social networking site
58. Security and privacy related to social networking sites are fundamentally behavioral issues, not technology issues. The more information a person posts, the more information becomes available for a potential compromise by those with malicious intentions. People who provide private, sensitive or confidential information about themselves or other people, whether wittingly or unwittingly, pose a higher risk to themselves and others. .....
Beware of TMI
59. Social networking means opening up and sharing information online with others, but theres some information you should never share online. Protecting yourself from sharing Too Much Information(TMI) cansave you from identity theft and even protect your physical safety.So lets start with the obvious .....
Customize privacy options
60. Social networking sites increasingly give users more control over their own privacy settings. Dont assume you have to take whatever default settings the site gives you. Check out the settings, configuration and privacy sections to see what options you have to limit who and what groups can see various aspects of your personal information. Facebook probably has some of the broadest privacy options, giving you control where no one, friends, friends and networks, or everyone can see basic info, personal info, photos, friends and postings. .....
Limit work history details on LinkedIn
61. Would you put your full resume online for everyone to see? Probably not. It would be too easy for identity thieves to use the information to fill out a loan application, guess a password security question (like hackers did with VP candidateSarah Palins Yahoo account) or social engineer their way into your companys network. Limit your work history details on sites like LinkedIn. If you feel you need the added information to help in a job search, expand the details during the job hunting process and then cut back later after you have a position, leaving just enough information to entice recruiters to contact you with interesting new positions. .....
Dont trust just verify
62. There are lots of reasons (most of them bad) why someone might impersonate or falsify an identity online. It could be as a prank or for fun such as those who impersonate a celebrity as satire. Faking an identity has a legit side too .....
Control commentsBlogs
63. Control commentsBlogs are beginning to use authenticated commenting systems like IntenseDebate (acquired by Automattic, the makers of WordPress blogging software.) Anonymous blog comments (marked as anonymous) are fine but some goofballs get their jollies leaving comments under someone elses name. It probably happens more often than we think. Commenting systems like IntenseDebate allow users to make anonymous or unregistered comments, or registered users can login and leave the comment as a verified user, letting others know it really is them. Contact the site administrator immediately if you find someone is impersonating you on a social networking site or in blog comments. Most reputable sites will take down the impersonated content. If they wont remove the content, ask that they note youve contacted them indicating you didnt leave the comment or personal page. .....
Avoid accidentally sharing personal details
64. You wouldnt put a note on your front door stating, Away for the weekend .....
Dont violate your companys social networking policies
65. Youve probably heard about an employee who was outted when playing hookie because they called in sick but blogged or Twittered about their escapades that same day. But there are more serious reasons you might be let go from your job due to the use of social networking tools. As blogging and social networking sites enter the workplace, so too are corporate acceptable use policies (AUP) being updated to define boundaries for employees, contractors and the company. Data leakage incidents (loss of corporate, confidential or customer information), making inappropriate public statements about the company, using corporate resources for personal uses and harassing or inappropriate behavior toward another employee can all be grounds for reprimand or dismissal. Social networking sites are another way those things can happen and they create an easy digital paper trail to investigate. .....
Learn how sites can use your information
66. Social network sites are typically free to use which means they are making their money by advertising to you. And that means they are collecting information about you. Is your information shared with outside companies and partners? What information can thirdparty plugin software, such as Facebook Applications, use from your profile or page content? Review the sites privacy policy and watch closely the privacy settings you can control. .....
Understand where you show up
67. Search yourselfIt is a good idea to search your name on Google and check out your profile as others see it on social networking sites. Understand where you show up and what information is available about you, and then adjust your profile, settings and habits appropriately. Dont worry, its not vain if you only search your own name once a month or so. If you unexpectedly see your name in locations you dont frequent, it could give you a heads up someone else is using your identity online. Set up a Google alert with your name, which emails you when Google finds your name on sites. While some names, like John Smith, are so common they would generate lots of false positives, you may still find out a lot about where your information is appearing online. Even if you find there are others online with the same name, it can help you avoid confusion, (or maybe its an opportunity to reach out and connect to someone with the same namesake). .....
Forget the popularity contest
68. Put a number on something and suddenly you have a competition. The person with the most friends isnt necessarily the winner in social networking, unless of course you are running for president or you are in some type of recruiting, sales or media business. Thats just more people, including possibly strangers, who now have access to more of your information. It is best to only friend people who really are or have become your friends. Your personal information has less opportunity for misuse. If you do get an unsolicited invite to connect, check them out first and try to figure out why you know them or if you even do at all. .....
Most Extraordinary Churches Of The World
Mr Ekos Church The Island near the beach camp. Architects: Eko and Charlie. Built in the 3rd season of Lost series. .....
Candle Sticks
Three white soldiers. Definition This candlestick has a tiny white body with upper and lower shadows that have a greater length than the body. It is accepted as a type of Doji and will act as a Doji when it appears Recognition Criteria 1. The body of the candlestick is wh .....
Fitness Stretching
Plantar Flexor and Foot Inverter Stretch. Foot and Calf Stretches: Method:Stand upright on the edge of a stair or beam, with the midsection of the right foot on the edge. Place the foot in an everted position (stand on the medial [inner] side of the foot). Bend the right knee slightly toward .....
Worlds Biggest Islands
Devon Island Canada. Devon Island, claimed to be the largest uninhabited island on Earth, is located in Baffin Bay, Qikiqtaaluk Region, Nunavut, Canada. .....
Awesome Literary T Shirts
Catch 22 T shirt. From Out of Print classic book jacket collection, it features a cover art forJoseph HellersCatch22. Read it .....
Best Places to Celebrate New Year
Miami. With its world class nightlife scene, Miami is a no brainer for New Years celebrations, and the city offers celebrations both free and VIP, and everything in between. (Thats not to mention the average temperature of 75 degrees.) The festivities in do .....
Festivals India
Dussehra. A very popular Hindu festival is Dussehra, this is a celebration for victory of Lord Rama over Ravana. The “Vijay” (victory) is celebrated on Dashmi “tenth day”, thus the festival is termed as “Vijaydashmi”. This festival is mostly concentrated in th .....
Tips For Men To Look Younger
Change your diet. The Change One diet and fitness plan is a realistic approach to weight loss that encourages dieters to improve health and fitness by making simple, gradual changes to their lifestyles and eating habits. The main principle of this program is that indi .....
Benefits of Star Apple
Fruit helps lower cholesterol. The soluble dietary fibre found in the fruit helps lower cholesterol, Star fruit may lower cholesterol levels and add bulk and moisture to feces. The high concentration of watersoluble Vitamin C, which is an antioxidant, is found in the Star fruit an .....
Best Women Trench Coats
Zara Cotton Trench Coat. .....
How to Be Chill
Evaluate how much this matters. Think about how much your problem matters in the grand scheme of things. Are you going to die? Is someone else going to die? As long as youre going to live, youll find a way to live through it and move on to more happiness and hardships. .....
Benefits of Elderberry
Health giving properties. Black Elderberry has been praised for its health giving properties; it has been used to treat a variety of ailments including colds, flu, fever and burns. More recent research has discovered that the fruit is rich in anthocyanins, a group of flavonoi .....
Rules to play Taekwondo
Protest. In the event that there is an objection to a judgment, the coach or manager of the pertinent team may submit a protest application to the Arbitration Board together with the fee of US$300 within 10 minutes after the pertinent match.The Arbitration Bo .....
Easy ways to Make Money Quickly
Sell clothes on eBay. Everyones best friend when it comes to getting rid of junk is eBay. Online auctions are a sure-fire way to turn that sleeveless jacket (which came in and out of fashion in a week) into hard cash. Some eBay sellers look at trends and try to predict wh .....
Rules to play Racquetball
Understand the objective and rules. Understand and be sure the other players understand the objective of the game before playing. A poor understanding of the game will slow down gameplay and lead to tension and arguments between players.Read the official rules of the game and watch vid .....
Benefits of Saffron
Beauty ingredient. Saffron or?kesar?has been used as a beauty ingredient for a very long time. Your mothers or grannies may have told you about its magical properties to heal the skin and used it albeit sparingly when making face packs. It is possibly the most expensiv .....
Handy Health Advices
Avoid water during meals. Do not drink water with meals. Water should be taken an hour before or an hour after your meals. Water during meals severely hampers your stomach's digestive powers and causes insulin levels to fluctuate significantly. .....
Benefits of Persimmon
Rich source of phytochemicals. The fruit is a rich reserve of assorted phytochemicals .....
Arvind Kejriwal
Education. He was born on Janmashtami birth day of Lord Krishna and one day after the Independence day of India. He was also called as Munna by his parents. Arvind was a very well known scholar from his schooldays. He did his schooling form Siwani and Ghaziabad .....
Precautions while using Power Supply
Checking the Power of the Equipment. The electrical equipment must be powerful enough to be connected to your power supply. You must also see that the power supply is adjusted to the correct voltage so that it would provide all the electric power that the equipment requires in order to .....
Fish Aquarium
Guppy. Males of the bred species can reach 1.5 inches, and females typically grow to about 2.5 inches. One of the most popular aquarium fish, the guppy is a live-bearer, meaning it does not lay eggs but produces live offspring. Although the wild form is occ .....
Healthy Foot
Head of sweaty feet. Your feet have sweat glands galore 250,000 in each foot! Perspiration creates the perfect environment for bacteria to set up shop. Wearing socks that keep feet dry will help your feet stay healthy. Socks made of synthetic fibers tend to wick away mo .....
Rules to play Sumo Wrestling
The wrestling ring. Sumo matches take place in a dohy a ring, 4.55 metres 14.9 ft in diameter and 16.26 square metres 175.0 sq ft in area, of rice straw bales on top of a platform made of clay mixed with sand. A new dohy is built for each tournament by the bout callers .....
Rules to play Arm Wrestling
Curl your thumb. After both people bring their hands together, put your thumb underneath your fingers. Doing this helps will help execute a technique called the top roll. .....
Prosperous Countries In The World
Sweden. Low unemployment, a strong economy, an advanced welfare system, and one of the highest standards of living in the world make Sweden a leader in numerous categories. .....
Interior Ideas
Coloring Wisely. Colors have a definite impact on the ambience and atmosphere you create while doing interior design for your room. It is known study that colors directly affect our mood, so when decorating its important to choose wisely. Colors can behave in three w .....
Benefits of Coriander
Antidiabetic Properties. Cilantro has been traditionally referred to as an .....
Precautions while using Electrical Equipment
One hand face and body to side. Use one hand with your face and body turned to the side when operating a safety switch. Limit possible injuries by not placing body parts directly in front of energized equipment when there is danger of an arc flash. If a device has a metal enclosure .....
Football Players
Edinson Cavani. Position : Forward Country : UruguayBeing a very useful and establishing himself as the most prolific player in the game, Cavani became a modern hit as he won the Copa America Cup with Uruguay. He was also a part of the Uruguay national squad which s .....
Venice
Santa Maria della Salute. Santa Maria della Salute (English Saint Mary of Health), commonly known simply as the Salute, is a Roman Catholic church and minor basilica located at Punta della Dogana in the Dorsoduro sestiere of the city of Venice, Italy.It stands on the narrow f .....
Oldest People To Accomplish Amazing Feats
Oldest Person To Visit The North Pole. The North Pole is a harsh environment with temperatures reaching ?43 .....
Benefits of Swiss Chard
The goosefoot family. The tall leafy vegetable is a part of the goosefoot family aptly named because the leaves resemble a gooses foot. Other members are beets and spinach. It is also rich source of minerals like copper, calcium, sodium, potassium, iron, manganese and .....
Chourishi Systems