Skip to main content

15 global challenges that cannot be addressed by any government acting alone

  The 15 Global Challenges  from t he Millennium Project, a global participatory think tank. 1. How can sustainable development be achieved for all while addressing global climate change? 2. How can everyone have sufficient clean water without conflict? 3. How can population growth and resources be brought into balance? 4. How can genuine democracy emerge from authoritarian regimes? 5. How can decisionmaking be enhanced by integrating improved global foresight during unprecedented accelerating change? 6. How can the global convergence of information and communications technologies work for everyone? 7. How can ethical market economies be encouraged to help reduce the gap between rich and poor? 8. How can the threat of new and reemerging diseases and immune micro-organisms be reduced? 9. How can education make humanity more intelligent, knowledgeable, and wise enough to address its global challenges? 10. How can shared values and new security strategies reduce ethnic conflicts,...

Many phishing telephone calls recently

About one month ago, I received a strange telephone call. At that time I was suffering from a bad cold, I had a very high temperature, very bad headache, and felt dizzy, but in high vigilance, though.

Phone rang, I struggle up from the sofa, the people on the other side was a man who claimed himself as "Yang", from certain department, certain committee in China, Chinese government would like to invite oversea Chinese to participate in the Olympic Games opening ceremony.

I was wandering how he knew my surname and phone number, I asked him where did he get my phone number.

He did not answer my question, instead, continued to ask me whether or not to participate the opening ceremony.

I said that I was not celebrities, why would Chinese government invite me?

He has asked me if I had a fax number, some documents should be sent to me.

I said that I did not have a fax.

He asked me if I could give him my email, he might sent the documents by email.

I said, you could find it from the company's Web site.

He said that if I do not intend to go, he would like to make arrangement for another person.

I say, you could do so.

I regretted a little bit that time for not making this telephone call clear, should I have missed the chance of attending the opening ceremony of Olympic Games to Beijing? Could I have opportunity to meet some important state leader, If I am lucky enough, might I have the opportunity to make a fortune promotion?

During last several weeks, I always received some strange telephone calls. As soon as I started to speak, the other side hung up the phone. A few days ago, I received a similar phone call again, that person also claimed himself as "Yang", his voice was so familiar that I suspected if he was the same person who wanted to invite me to attend the opening ceremony of Beijing Olympics, This time, he claimed that he was from some Department, some Committee of Chinese government in Beijing, there will be a summit take place in the People's Great Hall, Chinese government would like to invite overseas entrepreneurs to participate.

He then asked me if I have no fax, he might sent me important documents.

I said, no fax, you may send it via e-mail to me. I give him my company's e-mail address.

So far I have not received the promised e-mail. I talked with a friend of mine, he said that's telephone phishing scam. This kind of phishing have been discussed for a while in a Chinese community BBS, the wisest way to protect yourself from this kind of phishing scam is to speak in English. If he ask if he can speak Chinese, you just answer "sorry, I can't speak Chinese." No wonder that the phone call stopped strangely several times before I start to speak in English. But I am a Chinese, how can I resist to talk in my mother language if someone speak to me in my mother tongue first. How can I deny I can speak Chinese?

I told this story to another friend, who claimed that's definitely some spies, who are working for Chinese State Safety Bureau or some other department, specially collecting oversea Chinese personal sensitive information, good or bad. While he say so, his make a sly and mystery face and winked to me. I knew he was kidding, why do those spies want to collect my personal information?

It's said phishing attacks aren't just for e-mail anymore. Cybercriminals hoping to coax sensitive information from unwitting victims have a new weapon in their arsenal: the telephone.

Scam artists can make quick work of phone fraud with Voice over Internet Protocol (VoIP), which delivers voice calls quickly and cheaply, using the same technology that delivers e-mail via the Internet. I wonder that if that person use VoIP, such as Skype, because Skye is cheap. In some cases, fraudsters use what's known as a war dialer to make one call after another to a host of phone numbers in a given region. I always received some phone call in a Chinese takeaway, those caller claims themselves from some credit card company, they have Indian accent.

Even so, what can people do to protect themselves from new phone threats? Most experts recommend the same common sense that will keep you from getting into trouble online: Don't give out your information to unknown sources. Whenever you need to call someone, such as a banker, who would ask you for verification of personal information, make sure you got that phone number from an official directory, card statement, or Web site.

"If someone is calling you unsolicited, the No. 1 advice is to say 'I'm not interested."

Comments

Popular posts from this blog

coat-of-arms

Heraldry probably began with the knights in armour. When wearing a helmet in battle or in tournaments a knight could not be recognised; so he used symbols to decorate his shield and surcoat. The surcoat was the loose garment worn over the armour to protect it from rain or hot sun and actually was the "coat-of-arms"; it was decorated on the front and back with the same device as on the shield. The correct expression for entire design is an achievement . An achievement consists of the shield, helmet, rest, wreath, mantling and motto. These are the main parts. To them can be added supporters and a compartment. In the centre is the most important part, the shield . The surface of the shield is called the field  and on it the colourful charges are placed. The shield is called the arms or coat-of-arms  and can be drawn in any shape - in an upright position or slanting, which is the position it would fall into if hung on a peg. In Heraldry it slants to dexter. The helmet denot...

You can find your Wireless Network Key on Virgin Media Wireless Router

We have a new netbook computer, and don't know where to find network key, which is needed to setup wireless connection. A network key may also be called WEP (Wired Equivalent Privacy) key or WPA (Wi-Fi Protected Access) key. A wireless network key is a security feature that prevents unauthorized users from accessing a wireless network. An unprotected network is an unlocked virtual door, anybody within range can piggyback on the network undetected. I use Virgin media broadband with a Virgin media wireless router, this router has a WPA key taped on the router, that WPA key is an English word consisting of 10 letters. To tape network key on the router is a good idea, because we may never lose or forget a wireless network key as long as we possess the router.

15 global challenges that cannot be addressed by any government acting alone

  The 15 Global Challenges  from t he Millennium Project, a global participatory think tank. 1. How can sustainable development be achieved for all while addressing global climate change? 2. How can everyone have sufficient clean water without conflict? 3. How can population growth and resources be brought into balance? 4. How can genuine democracy emerge from authoritarian regimes? 5. How can decisionmaking be enhanced by integrating improved global foresight during unprecedented accelerating change? 6. How can the global convergence of information and communications technologies work for everyone? 7. How can ethical market economies be encouraged to help reduce the gap between rich and poor? 8. How can the threat of new and reemerging diseases and immune micro-organisms be reduced? 9. How can education make humanity more intelligent, knowledgeable, and wise enough to address its global challenges? 10. How can shared values and new security strategies reduce ethnic conflicts,...