2008 YODEX: The first-ever “Wow! Taiwan Design Competition” announced

Sunday, May 18, 2008

On the opening day of the 2008 Young Designers’ Exhibition (May 15), the Council for Cultural Affairs of Executive Yuan announced the first-ever “Wow! Taiwan Design Competition” at the Taipei World Trade Center. It will take place in conjunction with the main show (2008 YODEX). The winners from the Professional and Student classes were announced and awarded in an ceremony yesterday.

According to official information from the Taiwan Design Center (TDC), this first-ever design competition was designed for local participants to construct creative products with internationalizations and traditional cultures, and market them worldwide.

“EasTea / WesTea” and “Window & Box” also won the championship in the professional and student groups in this competition.

No Comments »

Two Kenyans kidnapped in Somalia by gunmen

Tuesday, November 10, 2009

According to witness reports, two Kenyan businessmen were kidnapped in the Somali capital of Mogadishu on Monday, and a ransom has been demanded for them.

The Kenyans, workers of the printing agency Hamar Adde, were taken from the Bakara market, the biggest trading centre in the Somali capital, at gunpoint. Eyewitnesses said that two Somalis in the company of the Kenyans were also taken, but later were released without a ransom.

Muktar Ise, a grocer at the complex, was a witness to the kidnapping. “The gunmen entered the printing shop and took the Kenyans with two Somali workers but they released the Somalis hours later. We don’t know the identity of the gunmen but they were heavily armed,” he said, as quoted by News24.

Relatives of the two freed Somalis confirmed the incident. The brother of one of the freed men commented that “they took the Kenyans to an undisclosed location and are asking for ransom.” The ransom amount, however, is not yet known.

“The two Kenyans have been in one of the most violent areas of Mogadishu because they were both Muslims. It is surprise to many people that fellow Muslims who resisted the high level of violence are to lose their liberties,” said media expert Hassan Mohamud from Mogadishu.

No group has yet claimed responsibility for the kidnapping.

No Comments »



  • 1 January
  • 2 February
  • 3 March
  • 4 April
  • 5 May
  • 6 June
  • 7 July
  • 8 August
  • 9 September
  • 10 October
  • 11 November
  • 12 December


No Comments »

Fig Trees Produce Fruit In Colors Of White, Green, Black, Red, Wine, And Purple}

Submitted by: Pat Malcolm

Fig trees are fruit tree garden favorites. Buying and planting large fig trees can fruit the first year of growing. Two of the best orchard or fig tree garden selections are: Brown Turkey Fig Trees and Celeste (Celestial) Fig Trees.

The fruit of the fig tree was well known in Biblical scripture and a fig tree was condemned to wither by Jesus in the Bible gospel of Mark 11:16 for being barren of fruit. The fig was used numerous times in the Bible to symbolize truths of the scripture, both in the old Testament and the New Testament Bible. The fig tree is a fast growing fruit tree that grows fresh fig fruit over a long period. The brown turkey fig tree and the Celeste (Celestial) fig trees have been important old varieties grown in the United States for hundreds of years. New hybrid fruit of fig trees vastly improves quality and quantity of figs of older selections. Fig fruit can ripen in various mature colors: red, black, yellow, purple, orange, gold, blue, green, and white with a sweet mild flavor. The ripe fig can be dried, eaten fresh, or cooked in a large variety of food such as fig newtons and fig-strawberry jam. The growing size of the fig fruit can vary just like the color. The largest fig grown is the Patrick’s Supergiant fig that can weigh-in at pound. Figs black in color like the the Black Mission fig tree and the Jack Black fig trees are very high in sugar content and date back to their introduction from Spain at the Spanish Missions in California in the 1500’s where the fig fruit was dried like raisins to be eaten later.

Green fig cultivars are important to buy for planting and growing for gardeners who want to avoid birds who love to feast on a red, yellow, or ripe white fig, because the birds do not see the green color of the Japanese Green Ischau fig or green Kadota fig among the green leaves.

YouTube Preview Image

For gardeners who prefer black fig fruit, the Jack’s Black fig and the black mission fig are tasty fig tree cultivars. The Black Mission fig is famous, and was intoduced into California by Spanish missionaries hundreds of years ago. Jack’s Black fig is very sugary, suitable for dried fig markets and elongated in shape.

Conadria fig trees originated in Europe and are important as a large, fast growing fig tree requiring a big landscape for a large tree. LSU hybridizers have released several notable yellow-gold cultivars; the most popular is the LSU gold fig that can produce two crops in one year. The Nero Caesar fig is yellow-gold in color and ripens with honey-drops of dew on the skin, with a pink pulp beneath the skin. Peter’s honey fig originated in California and the yellow color on the skin is repeated inside the fig that is sweetly scented.

Several white fig producing trees are available to buy from internet nursery sites. The Italian Everbearing fig ripens white, but may age into a cream-yellow skin. Italy is the point of origin for the Italian white fig, big in size and sweetly aromatic with a tasty flavor.

The Osborne fig tree is very unusual, because its color when ripe can vary from white to pink to red, but it is remarkably beautiful in appearance with its dark tapered rips that encircle the fig. The King Fig is big and grows burgundy-red in color on large trees. Some gardeners rate the King fig as the largest, and others rate the Patrick’s Supergiant fig as the largest.

The Mystery fig is a brightly colored wine fig with a delicious flavor, but scientists have been unable to identify this fig tree’s origin, which is still a mystery. Patrick’s Supergiant fig is very large, weighing up to a half pound each. The Patrick’s fig is juicy and sweet with an agreeable flavor. The Tennessee Mountain fig tree is very cold hardy and was discovered growing in the mountain areas of Tennessee where temperatures can fall below 0 degrees Fahrenheit. For gardeners who want to bu a cold hardy fig tree for the North, the Tennessee Mountain fig has survived very cold temperatures as far North as Pennsylvania and New York. TyTy Nursery offers a large selection of small or big fig trees for fast shipment.

About the Author: Learn more about various plants, or purchase ones mentioned in this article by visiting the author’s website:

TyTy Nursery


Permanent Link: }

No Comments »

Truck loses control in Andhra Pradesh, kills more than a dozen

Sunday, April 23, 2017

More than fifteen people were killed near the police station in Yerpedu, Andhra Pradesh, India after a heavily loaded truck lost control on Friday afternoon at about 1:45 P.M. IST (0815 UTC).

People, mostly from the village of Munagalapalem, were gathered to protest local illegal sand mining. The truck hit an electric pole, and destroyed nearby shops and vehicles causing a short-circuit and fire. Tirupati Urban Superintendent of Police R Jayalakshmi said the truck crushed some people under its wheels; six people were killed that way according to Renigunta deputy superintendent KS Nanjndappa. Other people died due to the short circuit and the fire. More than fifteen people were injured including the police station’s chief inspector and the sub-inspector. Reportedly at least ten were in a critical condition.

The driver fled after the accident. Victims were taken to hospitals in Tirupati, and Chennai and Vellore in Tamil Nadu. N Chandrababu Naidu, Andhra’s Chief Minister, said via Twitter, “State Cabinet has announced a compensation of Rs 5 lakh [0.5 million] to the families of the deceased.”

No Comments »

Predictable random number generator discovered in the Debian version of OpenSSL

Friday, May 16, 2008

A major security hole was discovered in the pseudo-random number generator (PRNG) of the Debian version of OpenSSL. OpenSSL is one of the most used cryptographic software, that allows the creation of secure network connections with the protocols called SSL and TLS. It is included in many popular computer programs, like the Mozilla Firefox web browser and the Apache web server. Debian is one of the most used GNU/Linux distributions, on which are based other distributions, like Ubuntu and Knoppix. The problem affects all the Debian-based distributions that were used to create cryptographic keys since the September 17, 2006. The bug was discovered by Luciano Bello, an argentine Debian package maintainer, and was announced on May 13, 2008.

This vulnerability was caused by the removal of two lines of code from the original version of the OpenSSL library. These lines were used to gather some entropy data by the library, needed to seed the PRNG used to create private keys, on which the secure connections are based. Without this entropy, the only dynamic data used was the PID of the software. Under Linux the PID can be a number between 1 and 32,768, that is a too small range of values if used to seed the PRNG and will cause the generation of predictable numbers. Therefore any key generated can be predictable, with only 32,767 possible keys for a given architecture and key length, and the secrecy of the network connections created with those keys is fully compromised.

These lines were removed as “suggested” by two audit tools (Valgrind and Purify) used to find vulnerabilities in the software distributed by Debian. These tools warned the Debian maintainers that some data was used before its initialization, that normally can lead to a security bug, but this time it was not the case, as the OpenSSL developers wrote on March 13, 2003. Anyway this change was erroneously applied on September 17, 2006, when the OpenSSL Debian version 0.9.8c-1 was released to the public.

Even though the Debian maintainer responsible for this software released a patch to fix this bug on May 8, 2008, the impact may be severe. In fact OpenSSL is commonly used in software to protect the passwords, to offer privacy and security. Any private key created with this version of OpenSSL is weak and must be replaced, included the session keys that are created and used only temporary. This means that any data encrypted with these keys can be decrypted without a big deal, even if these keys are used (but not created) with a version of the library not affected, like the ones included in other operating systems.

For example any web server running under any operating system may use a weak key created on a vulnerable Debian-based system. Any encrypted connection (HTTPS) to this web server established by any browser can be decrypted. This may be a serious problem for sites that requires a secure connection, like banks or private web sites. Also, if some encrypted connection was recorded in the past, it can be decrypted in the same way.

Another serious problem is for the network security software, like OpenSSH and OpenVPN, that are used to encrypt the traffic to protect passwords and grant the access to an administrative console or a private network protected by firewalls. This may allows hackers to gain unwanted access to private computers, networks or data traveled over the network, even if a not affected version of OpenSSL was used.

The same behavior can be applied to any software or protocol that use SSL, like POP3S, SSMTP, FTPS, if used with a weak key. This is the case of Tor, software used to offer strong anonymity on the TCP/IP, where about 300 of 1,500-2,000 nodes used a weak key. With 15-20% of weak Tor nodes, there is a probability of 0.34-0.8% circa to build a circuit that has all tree nodes weak, resulting in a full loss of anonymity. Also the case of only one weak node begin used may facilitate some types of attack to the anonymity. The Tor hidden services, a sort of anonymous public servers, are affected too. However the issue was speedly addressed on May 14, 2008.

The same problem also interested anonymous remailers like Mixmaster and Mixminion, that use OpenSSL to create the remailer keys for the servers and the nym keys for the clients. Although currently there is no official announcement, at least two remailer changed their keys because were weak.

No Comments »

Aromatherapy Accessory: Products To Aid Aromatherapy}

Submitted by: Remy Jirek

If you love to practice aromatherapy, then you should consider purchasing an aromatherapy accessory or two. The types of accessories you can get vary just as greatly as the forms of aromatherapy available on the market. Even if you consider yourself to be a casual practitioner of aromatherapy, accessorizing may be a great way for you to get more out of your aromatherapy. Here is your roadmap to determining which types of accessories you should purchase to compliment your aromatherapy products.


Having containers for your aromatherapy products are the most convenient way to transport your supplies. One popular accessory is a small glass vial and dropper. You can take this in to your next massage or reflexology appointment and put your favorite essential oils directly into your massage oils.

Another popular container is a scent proof holder for your aromatherapy products. This will allow you to store your bath oil or body oils without discomforting those around you. Finally, you could also get a glass jar which can be used to mix different plant oils. This will allow you to try a variety of combinations for yourself without damaging the oils in your original container (to save you from potentially contaminating an entire bottle of oil).

YouTube Preview Image


There are also many popular aromatherapy devices that will aid you in using aromatherapy. One is an aromatherapy inhaler which allows you an easy and convenient way to use aromatherapy wherever you go. These are especially nice because they do not bother the people around you (important, especially if your loved ones are sensitive to certain scents).

Another great device is an electronic oil burner. These machines will regulate the amount of oil you burn, saving you from over or under using plant oils in a burner. Finally, you can get devices for aromatherapy spray that will automatically regulate the amount of spray in the air.

Other Accessory Ideas and Tips

It could be of great help to you to purchase an incense burner if you use these for aromatherapy. This will allow you to collect all of the ashes as they are created and prevent potential fires from incense falling onto flammable materials.

If you practice herbal aromatherapy, it might be a good idea for you to get some products that you can use to extract your own essential oils. These products range in both price and type, but are a great way to ensure that the oils you are using are 100% fresh and natural.

Another great accessory you could get is a spray bottle. With one of these, you can use any choice of essential oils as a perfume, air freshener, or even a natural deodorant.

Finally, you should also consider purchasing texts or charts related to aromatherapy to help you ensure that you are getting the best value from the aromatherapy products that you buy. Finding a good aromatherapy guide is relatively easy and can save you great amounts of money in the long run.

About the Author: Aromatherapy is a great, natural way of de-stressing, feeling invigorated and staying healthy! Dont continue to miss out on this health boom:


Permanent Link: }

No Comments »

Japanese tsunami impacts California coastal town

Sunday, March 13, 2011

The tsunami caused by Japan’s magnitude 8.9 quake on Friday destroyed the commercial fishing harbor of Crescent City, California, a coastal town still recovering from a devastating tsunami in 1964. Although most of the fishing boats were removed in advance, the 198 docking slips that the harbor had provided for boats, enabling the livelihoods of the fishing crews, were lost.

Harbormaster Richard Young said that the harbor is destroyed. “We’re facing not only physical but financial disaster,” he said during a briefing. “Our business activity came to a screeching halt yesterday, and that affects the entire community.” Councilwoman Kelly Schellong said, “This is going to have a trickle-down effect beyond the lost jobs.”

Crescent City’s unemployment rate was 13 percent before Friday’s tsunami destroyed its commerical fishing industry.

The 1964 tsunami that hit Crescent City killed 11, demolished the harbor and heavily damaged large portions of the business district. Although the city subsequently rebuilt, another tsunami again damaged the harbor in 2006. The city was in the midst of reconstructing the harbor when Friday’s tsunami hit. The harbor is surrounded by land and a breakwater built after the 1964 disaster. The tsunami’s huge waves entered through a small opening provided for the entrance and exit of boats.

Lori Dengler, director of the Humboldt Earthquake Education Center, says Friday’s tsunami was one of as many as 38 tsunamis to strike Crescent City within the last 78 years. She calls the city a “tsunami magnet” because of the topography of the ocean floor that contributes to its vulnerability. She also blames the breakwater built after the 1964 tsunami because it traps tsunami waves in the harbor, causing them to boil and churn.

A county supervisor found the view painful on Saturday as she surveyed the wreckage accompanied by state officials. She is hoping they will provide emergency assistance. “We don’t have the financial resources,” she said. “We need money. That’s what it takes to fix things…. Our poor little harbor.”

No Comments »

Man remanded in custody after allegedly spraying urine on goods in Gloucestershire, UK

Monday, May 19, 2008

Sahnoun Daifallah, of White City, Gloucester, was today remanded in custody by Cheltenham magistrates after being arrested for spraying a “foul-smelling, brown substance” from a sports bottle. The liquid is thought to have contaminated food, books, wine bottles, and other items across several stores in Gloucestershire.

Mr Daifallah, the court was today told, committed the offences over multiple days. The attack on a Tesco supermarket, where frozen chips and wine bottles were contaminated with what Tesco claims to be a “mix of human urine, faeces, and domestic products” happened on Friday. He is also accused of a similar offence in a Morrisons supermarket 4 miles away on the same day. Two days previously, Mr Daifallah is accused of spraying the substance inside a pub near Cheltenham, contaminating food, and contaminating over 700 books in a Waterstone’s bookstore in nearby Cirencester.

Mr Daifallah today confirmed that he was at the locations stated, however he indicated he will be pleading not guilty to the charges. He has been remanded in custody until May 28th, when he will appear before Stroud magistrates via videolink to be committed to Gloucester Crown Court – a decision made by magistrates after the estimated damage by the defendant was given at over £10,000, plus cleaning and replacement expenses.

No Comments »

Ole Miss player arrested; charged with selling steroids

Tuesday, January 29, 2008

Jared Foster, a transfer quarterback with the University of Mississippi (Ole Miss) Rebels football team, was arrested yesterday in Oxford, Mississippi and charged with selling steroids.

Rebels head coach Houston Nutt said that Foster will not be allowed to remain with the team.

Foster was arrested for alcohol possession by a minor and contributing to the delinquency of a minor in 2006 while a star player for Madison Central High School in Madison, Mississippi. Prosecutors agreed then not to try the case on the conditions that Foster help police in a steroid investigation and stay out of trouble.

No Comments »