Thursday 19 July 2012

ONLINE SOFTWARE STORE

ONLINE MEDIA TECHNOLOGIES PRODUCTS Register 1-Year License and use all multimedia 18 tools without any limits! AVS4YOU One Year Subscription INESOFT PRODUCTS CalcNote is a calculator and a notebook in one. CalcNote was developed to be available at any time. On your Pocket PC screen, CalcNote is displayed over other applications. It's easily accessible and takes up very little space. Inesoft CalcNote Eng WWW.POWER-UNDELETE.COM PRODUCTS Power Undelete Wizard is an easy-to-use, windows based application designed for recovering deleted files from NTFS or FAT32 volumes. It even can recover files from formatted or reformatted disk. It can scan disk and find lost files and data blocks, these lost files may be deleted by mistakes, viruses, trojans, spywares, or other applications running on your PC. Like no other recovery tool Power Undelete Wizard is easy to use, featuring a step-by-step interface that will guide you through several stages of data recovery. You will get your deleted or lost files back in minutes. Power Undelete Wizard(Lifetime License) ALMEZA RESEARCH Quickly Reinstall Windows without any data loss! Almeza MultiSet automates the installation of any version of Windows, complete with all the latest service packs, patches and security updates. It installs a pre-configured, ready-to-use operating system to all computers in your organization. Save weeks of work by installing and configuring all required applications completely unattended! MultiSet Home License RADIALIX SOFTWARE Radialix 2 is a super easy, technically elegant tool for localization of PE32 executables, .NET assemblies and resource files. It allows the user to localize resources and hard-coded strings using a WYSIWYG editor and a set of productivity tools, such as translation simulation, auto-translation, translation validation and translation memory. These features enable developers to localize an application without hassles and enter new markets quickly. Radialix Personal License PILOTGROUP PRODUCTS Create, import and manage you mailing lists, choose a template for your newsletter or create a new one, personalize each email with simple tag integration. Comprehensive Reporting. NEW: possibility to launch your own Newsletter Service. PG Email Newsletter Software (Basic License) PV LOGICIELS PRODUCTS dotNet Protector is a powerful .NET code protection system that prevents your assemblies from being decompiled. Console exe, windows exe and windows services,. You can protect a whole application (main exe, referenced dlls) in a single executable. dotNet Protector Classic TECHNISIENT PRODUCTS Samay Enterprise Scheduler is a powerful .NET scheduling system which can be used to schedule the simplest to the most complicated Jobs. It is a stand-alone system handling all your scheduling needs.It completely replaces Windows© Services & Windows© Task Scheduler for background tasks like reporting, maintenance, nightly runs and other cron-like jobs. More details at http://www.technisient.com Samay Enterprise Scheduler SIGNALATOR LIMITED PRODUCTS Powerful application for creating profitable trading systems primarily on forex market. Back test software. Signalator FX RETINA-X STUDIO, LLC PRODUCTS SniperSpy is remote monitoring software which allows you to secretly see what your child or employee is doing on your distant PC. Are you worried about what they are doing on Facebook or Twitter? With whom are they communicating? After installation the software records all activities. Watch the remote screen LIVE from anywhere! View screenshots and text logs of activities like chats, websites visited, keystrokes and more. View activity inside a secure online account. SniperSpy (3-Month License) PROMATRIX INC PRODUCTS The VoiceOver Speech Sequencer enables you to easily add speech to your video presentation. You just create a MS-Word document containing the narration and the audio is added to your video instantaneously. Two plug-ins make the integration possible, the VoiceOver MS-Word Plug-in and the VoiceOver VST Plug-in. Complete Real-time Integration VoiceOver Word Plug-in DB SOFTWARE LABORATORY PRODUCTS Advanced ETL Processor extracts data from any database, transforms, validates it and loads into another database completely automatically. At any time, you can press the "Preview" button and see what the results of an ETL flow would look like. Advanced ETL Processor Standard - single licence VISIOFORGE PRODUCTS VisioForge Video Capture SDK allows programmers to easily integrate video capturing and processing capabilities into their software applications. VisioForge Video Capture can play and capture video and audio streams from TV tuners, USB webcams, DV camcorders, PCI capture cards, USB capture devices and FireWire cameras. Video Capture SDK Standard - One Developer ZHENG YUNWEN PRODUCTS A compact but powerful Web Vulnerability Scanner and SQL Injection Tool! WebCruiser Web Vulnerability Scanner Personal Edition ADM SOLUTIONS PRODUCTS The software for financial risk management is based on an analysis of the negative impact of environment on the financial conditions and business enterprises in unpredictable financial and market surroundings. In the center of the analysis are the following risks: sales risk, foreign currency risk, interest rate risk, purchase price risk, bankruptcy risk, credit risk and liquidity risk. Financial Risk Analyser MESSOR ANALYTICS PRODUCTS Fibonacci Bands Package for NinjaTrader, MultiCharts and eSignal. Fibonacci Bands Package BINBASE PRODUCTS BinBase.com BIN Database Single License RAMUS PRODUCTS This software is designed for building enterprise management systems. Ramus can develop and be linked to the graphical process models a system of classification and coding company. Within the system of classification and coding can be collected and stored, in an orderly manner, all the necessary business management skills. Ramus GRAPHIC REGION PRODUCTS FAX, TIF, PDF, EPS, PS, AI, DCX viewer, editor and converter, offers you a full solution for viewing, editing, printing, saving, converting. Able Fax Tif View can convert one- and multipage files to standard TIFF/FAX format, jpeg, png, bmp, pcx, gif, dib, rle, tga, pdf, ps, eps and more. Able Fax Tif View can edit loaded images - extract, move, insert, delete, rotate, flip, invert pages, remove noise, deskewing image, color adjust, add margins. Able Fax Tif View CONNECTCODE PTE LTD PRODUCTS ConnectCode Code 39/MSI Barcode Font is a professional True Type (TTF) Barcode Font that is designed for use in modern operating systems. It allows you to create Code 39 or MSI barcodes by selecting the font in your favourite text editor. The software includes the following items: All the 7 sizes(height) of the Code 39/Code 39 Ascii/MSI/Code 93/POSTNET Font Postscript fonts Encoder Application VB Macros for MS Office Crystal Report Formulas Sample Access database with VB module Web Fonts Oracle PL SQL Barcode Console/Command Prompt Barcode The purchase of the Single User License allows the use of the Code 39/MSI/POSTNET Barcode Font and Software by one user on one computer within your organization. Code 39/MSI Barcode Font - Single User SUNDEWSOFT PRODUCTS WebSundew 3 Pro (Single License) PYRAMID SOFTWARE PRODUCTS If your hardware system (fittings system) that you are looking for is not listed in our database you can still have it as a custom hardware system. You should have a hardware catalogs with detailed usage schema for each hardware item. Database - Custom Hardware System MAGIK PRODUCTS 1 Year - 300 MB Linux hosting + free website builder, 5 pages, hundreds of templates, form builder. ---------------------------------- Free 30 days trial of our website builder, Try it Now. It's as easy as 123. First Act 4VIDEOSOFT PRODUCTS 4Videosoft Video Converter Platinum can convert between any video formats including MPG, MPEG, MPEG2, MP4, SWF, FLV, VOB, MOD, M4V, AVI, etc, along with HD videos, like HD TS, HD MPG, HD MPEG, HD MP4, HD AVI, etc and extract audio from these videos. 4Videosoft Video Converter Platinum CYBER FUTURISTICS INDIA PRODUCTS Per Incidence S KNOWLEDGE NOTEBOOK , LLC Education software that automatically organizes notes and boosts learning, good for students with Windows OS -based computer. Sold 60 copies in 2 days! Knowledge NoteBook COOL SOFTWARE PRODUCTS ABCFastDirectory BGYAZILIM PRODUCTS Our Web Based ERP Solution Developing for Steel Sector,Also We can developing solution any Sector. we Have Core Package We can Develop Your Needs. PlusWeb ERP For Steel Sector IT TO GO PTE LTD PRODUCTS Diskeeper 2011 Professional 1 PC, Free BitDefender 2012 Antivirus Pro 1 Year 1 PC MLM INTERNATIONAL PRODUCTS MLM software for everyday work. Organize and manage your everyday tasks, track your downline and lead your business on simple and easy way. MLM Downline manager MIGAN TECHNOLOGY PRODUCTS MITA is a audio engine system for audio processing.It can be used in kinds of software of game, multimedia processing, speech synthesis, music creation and sound processing and so on.It has lots of features and functions to make it easy to process audio files. MITA WING FTP SOFTWARE PRODUCTS Wing FTP Server is a highly functional, easy-to-use and secure FTP Server solution that can be used in Windows, Linux, Mac OSX and Solaris. Wing FTP Server - Standard Edition for Linux LMDSOFT CORPORATION PRODUCTS CutLeader CNC cutting intelligent nesting software (V 2.1 version) is a computer-aided design and manufacturing systems, primarily used in CNC laser cutting machines, plasma cutting machines, flame cutting machines and super high pressure water jet cutting machines and other cutting motion control systems, also to laser engraving machines. We have received good comments from large amount of the customers, since stable performance and professional service. CutLeader V2.1---CNC Cutting Intelligent Nesting Software ATOMPARK SOFTWARE PRODUCTS Newsletter delivery program. Send personalized e-mail messages Atomic Mail Sender PIIPL PRODUCTS PERPS v5.0 Enterprise Edition IMONITOR SOFTWARE PRODUCTS Centrolized company-wide employee pc activity monitoring solution, monitor 2000+ network computers within one server. a href="https://secure.avangate.com/affiliate.php?ACCOUNT=IMNITORT&AFFILIATE=37316&PATH=http%3A%2F%2Fwww.monitor-employee.com">IMonitor EAM Standard Edition 3 computers license KINSOFT AUSTRALIA PRODUCTS Create your ideal document Kingsoft Office 2010 offers robust set of features that you needed to create professional documents. It contains three essential office applications: Kingsoft Writer, Kingsoft Presentation, and Kingsoft Spreadsheets with familiarity of interface and ease-to-use functions. No re-learning process is required. With its strong compatibility with variety of file formats, Kingsoft Office 2010 is the best alternative to Microsoft Office. Kingsoft Office 2010 Professional 1 PC MAGELLAN PANGAEA LIMITED PRODUCTS VCMS - Complete Source (PHP + FLA Source Files, 1 Domain, White Labeling Enabled, Non-Exclusive/Non-Resalable) - Full Access, Completely Unlimited VCMS - Complete Source (PHP + FLA Source Files, 1 Domain, White Labeling Enabled) - Full Access, Completely Unlimited TRUSTIFIER INC. PRODUCTS ryū Perpetual End User License for single server single virtual host RYU 1.0 PERPETUAL SINGLE SERVER END-USER LICENSE TRADERSORACLE forex, forex trading signal,trading signal,managed account,forex trading,stock trading software,signal,stock signal,trading signal provider,forex trading,trading signal software, trading software, instant Buy and sell signals,forex signals Tradersoracle pro CM-CONSULT PRODUCTS This application is to ease the process of programming ClearQuest Designer's state transitions matrix for change requests. UML2ClearQuest can export UML state charts to ClearQuest Designer, which makes for a simple visual design process. UML Export is supported from StarUML, IBM Rational Software Architect or MS Visio. The demo version can export diagrams to IBM Rational ClearQuest with no more than 3 states. See success story. Compatibility: Compatible with any ClearQuest version (including ClearQuest 7.1) 'UML2ClearQuest' Tansform UML diagrams into ClearQuest Designer state matrix (user license) CORPSOFT PRODUCTS OnLAN Messenger is a fast, safe, fully controllable, and resource efficient messaging service (instant messenger). OnLAN Messenger is a corporate oriented solution that will help you to improve the messaging abilities of your company (including sister companies). OnLAN Messenger is an enterprise instant messenger. OnLAN Messenger 4, 25 license package CAFÉ CONTENT SOLUTIONS PRODUCTS [Free Setup, Free Data Import, Free Customization, Free Training, Free Upgrade & Free Email Support] Human Resource Management System ( CCSHRM) propose an adaptable and easy to use solution for small and medium sized companies. By providing modules for personnel information management, employee self service, leave, time & attendance‚ benefits and recruitment companies are able to manage the vital company data and peoples. The combination of these modules into one application assures the perfect platform for re-engineering and aligning your HR processes along with the organizational goals. Human Resource Management System (CCSHRMs) WINMEND PRODUCTS WinMend Data Recovery is a Windows-based data recovery application. WinMend Data Recovery REFOG.COM PRODUCTS REFOG Keylogger is a multifunctional keyboard tracking software that is widely used by both regular users and IT security specialists to record keystrokes. REFOG Keylogger - 1 License LIVETICS PRODUCTS TimeLive Web timesheet suite is an integrated suite for time record, time tracking and time billing software. The TimeLive suite of products delivers a time tracking solution for professional service providers. TimeLive Web Timesheet Enterprise Version (Unlimited Users) SMART-SOFT PRODUCTS Traffic Inspector Traffic Inspector Gold 5 ANDREAS LAZAROU PRODUCTS Search Engine Optimization packages provided by www.packages-seo.com Small Seo Package WINWEBMAIL PRODUCTS WinWebMail Server - Web Mail Server for Windows NT,2000,XP,2003. Supporting WebMail,S-MIME(RSA,DSS),SMTP,SSL-SMTP,POP3,SSL-POP3,IMAP4,SSL-IMAP4,TLS-SSL,AntiSpam,AntiVirus,BBS,Calendar,CA Server WinWebMail Server 250 Users NESTPROFESSOR PRODUCTS NestProfessor can nest parts on the materials intelligently. this is a Powerful Tool for nesting with dxf/dwg files import/export. Release Notes New features:  Interspace between parts were used to nest the smaller parts, so utilization of the materials is improved.  User can specify the rotate angle of the part on sheet.  Provide a more friendly user interface.  Part/Sheet can be previewed. NestProfessor User Edition 2.3 New version released!   Release Notes (New features): 1) Interspace between parts were used to nest the smaller parts, so utilization of the materials is improved. 2) User can specify the rotate angle of the part on sheet. 3) Provide a more friendly user interface. 4) Part/Sheet can be previewed. 5 ) Perform the boundary check of the part before nesting. 6 ) Provide more statistics info of the nest result. NestProfessor User Edition 2.3 ESTARD PRODUCTS Data Mining Software for Business and Science ESTARD Data Miner (Annual Non-commercial license) RANCE COMPUTER PVT LTD PRODUCTS FusionRetail™ 6 Express Edition (Single User) GRAPHIC-REGIONAL DEVELOPMENT PRODUCTS Advanced TIFF Editor is a FAX, TIF (TIFF), PDF, DCX, EPS, PS, AI and GIF viewer, editor and converter, offers you a full solution for viewing, editing, printing, drawing, saving, converting. Advanced TIFF Editor (personal) ES TECHNOLOGY PRODUCTS With CodeProof, which is only available as an "add on" to CodeForm, you add an extremelycomprehensive Formula library (more than 1000 prefabricated formulas in sheets) of standard pages based on CEN-EN and the BS-EN set up in CodeForm, to the CodeForm usage advantages. CodeProof’s added value is the distinguishing aspect that the search for and interpretation of the national standards on paper is no longer necessary. Technosoft has done this work for all the customers who require a digitalised calculation version. CodeProof is an extremely comprehensive formula library (more than 1500 prefabricated formulas in sheets) of Eurocode CEN-EN and BS-EN standards setted up in its own calculation management suite - CodeForm. CodeProof’s added value is in the fact that there is no need to search for an interpretation of the national standards on paper. Technosoft has done this work for all the customers who require a digitalised calculation version of Eurocode. CodeProof VOWSOFT PRODUCTS Find, view, download and manage millions of pictures from the web automatically and easily. Set the filter profile and specify a web address, and Picaloader follows every link to get the pictures you want, including Javascript, VBScript and Jscripts. PicaLoader TIAN GANG PRODUCTS XARROW_150: support 150 tags and 0 web client. xarrow_150 GWSYSTEMS LTD PRODUCTS BinDB Premium License Database BinDB Premium License SAUTINSOFT PRODUCTS Excel to PDF .Net is a standalone C# library to convert Excel spreadsheets and workbooks to PDF, Word, RTF. Excel to PDF .Net AVISMAP GIS TECHNOLOGY PRODUCTS Simple yet poewrful GIS data processing. AvisMap Deskpro LEADERTASK PRODUCTS LeaderTask is a business organizer for a modern person. LeaderTask has a smart system for managing projects, tasks, contacts, events. Want to complete more? Get tired less? Earn more? And permanently improve the quality of life, work hard less and contemplate peacefully more? LeaderTask will help you with that! LeaderTask = Scheduler + Personal Information Manager + Calendar + Address Book + Organizer! LeaderTask VIRTOZO PRODUCTS ConsultSis is the first advanced video consulting platform which connects customers with consultants (e.g. doctors, lawyers, psychics) via browser-based video conferencing. ConsultSis lets you charge your customers per minute or per consultation and earn a percentage commission on all video consultations. ConsultSis STATIC-WARE PRODUCTS HyperNet 4 - Personal Search Engine - Review Website Builder = Making Money Online Build large content focused websites with ads, a sitemap, an rss feed and all the little tweaks needed for search engine optimization and extremely relative ad placement. Great potential to earn money with online advertising systems with HyperNet4. The entire website build process is automated, only basic HTML knowledge is required to generate large websites very quickly. Once set up, the system allows anyone to create articles and reviews about any website and topic the HyperNet4 crawling system has gathered. The example HyperNet4 website at staticware was built in 20 minutes! HyperNet4 EXTREME COMPONENT PRODUCTS JComponentPack is a Java Swing GUI library, a visual JavaBeans collection JComponentPack Professional Edition, Single Developer License (3 Month Maintenance Included) 24X7 SOFTTECH PRODSUCTS Designed to adapt to your way of working, RecruitPro enhances your Recruitment process, streamlines workflow and increases productivity in and profitability of your organisation. RecruitPro 360 is a fully customizable software which can actually be customized by you. It is the result of over 11 years of Recruitment expertise of the promoters and an expert team of developers. RecruitPro 360 STEWARE TECHNLOGY PRODUCTS Steware Gauge .NET is a fully managed Windows Form control, that help the developers add a gauge in the application to simulate the gauge in true-life and provide the gauge representation for the input data. Steware Gauge .NET SC MINDBOX SRL PRODUCTS autoMinder è un programma per la gestione di tutte le informazioni tecnico-amministrative relative alle vetture aziendali. autoMinder - licenza d'uso per una workstation LJUBISA KNEZEVIC PRODUCTS O2001SSW Data Acquisition Software for Opticon OPN-2001 bar code scanners enables memory scanners to communicate with any Windows application. Send barcodes directly into a database application as keystrokes. Send barcodes to log files (NEW generic file naming option available). Send barcodes to databases using ODBC drivers: Oracle, SQL, Access, Excel... Automatic Date Time or Scanner ID stamping. No hardware additions required! O2001SSW for Opticon OPN-2001 EZYMEDIA PRODUCTS Affordbale publishing package for professional and first-time newspaper or magazine publishers. Sophisticated website CMS, export to/fromt print, manual, tutorials, ad-server and much more! Complete site setup within 24-hours. EzyMedia Newspaper & Magazine Website Publishing Pack SAUTINSOFT PRODUCTS ASP.Net server component to export HTML into Word dynamically HTML-to-RTF Pro DLL .Net POLARICOM AB PRODUCTS Jet Profiler for MySQL is real-time query performance and diagnostics tool for the MySQL database server. It's detailed query information, graphical interface and ease of use makes this a great tool for finding performance bottlenecks in your MySQL databases. Jet Profiler for MySQL MIDISA SOFT PRODUCTS The program can work both in the form of a separate warehouse and with the manufacture module. In the program the complete course since goods receipt on a warehouse, before reception of a finished article from manufacture is realised. Warehouse production Clien - Server CENTRACTIVE AG PRODUCTS Professional tool to ad-hoc, fast and efficiently search big enterprise log data locally, on distributed servers as to visualize changes using tail functionality. Retrospective RCHILLI PRODUCTS RChilli is a leading software product company in Recruitment space. When a resume parsing is done, thousands of calculations are performed and within few seconds, the candidate information is extracted, validated using artificial intelligence and the information is accumulated in a database, hence simplifying the whole resume handling process. Resume Parser ABK-SOFT LTD AbleDating (Single Domain License) JIBIT SOFTWARE PRODUCTS AbleDating (Single Domain License) GDT PROFESSIONAL MANAGEMENT CONSULTANTS PRODUCTS Figurro Accounting Software for Small & Medium Business. Easy to use, Professional & Effective. Figurro Accounting Software

Friday 2 December 2011

HOW TO ATTRACT PERFECT HEALTH, MONEY AND GENERAL SUCCESS

Hey! Check HERE! Best Forex Traders worldwide, give you advice for FREE to buy or sell. ZuluTrade converts this advice to a live trade in your broker account automatically, again for FREE! Unique service to ensure that you make money in forex trading.

Iam that I am, eternal I am. Led and guided in all my ways by the Infinite Intelligence in my subconscious mind. Nothing can touch me, nothing can defeat me. I reign supreme over everything. Realising my dreams, desires, wishes and aspirations.
Being thankful to the Infinite Intelligence in my subconscious mind for my perfect health this day. Every cell, nerve, tissue, muscle and organ of my body is now being made whole, pure and perfect. My whole body is being restored to perfect health, vitality and youthfulness, and the Divine Law of Harmony and Spirituality is operating in my mind and body.

Being thankful to the Infinite Intelligence in my subconscious mind for all the money I need to live comfortably and happily. Money, money, money is becoming mine everyday. Money, money, money is flowing to me from every direction. Money, money, money is constantly circulating in my life. I like money, I love money, I use money wisely, constructively and judiciously. Releasing money with joy, and money returning to me multiplied in a wonderful way. It's good, very good!

By day and by night, I am improving, succeeding, prospering, my business growing and living positively in all aspects of my life.

Surely, goodness, kindliness, goodwill and mercy shall be following me all the remaining days of my life, and I will forever be loved, admired, respected, fortunate, lucky, influential and happy.
SO BE IT!!
Meditate quietly and with concentration repeating three times each session.




Thursday 1 December 2011

WORLD AIDS DAY 2011

Hey! CHECK HERE! Best Forex traders worldwide, give you advice for FREE to buy or sell. ZuluTrade converts this advice to a live trade in your broker account automatically, again for FREE! Unique service to ensure that you make money in forex trading.

According to Dr. Lennie Bazira Kyomuhangi - Country Director, AMREF Kenya,
HIV and AIDS remains one of the top public health threats in Kenya and in the African continent. At the end of 2010, approximately 75% of 34 million people living with HIV came from sub-Saharan Africa, where AMREF operates. Women are more vulnerable than men; 60% of people infected with HIV in Africa are women. As Africa's leading health development organisation working with communities, AMREF shares this year's global theme of 'getting zero new HIV infections, zero discrimination and zero AIDS-related deaths.

The proportion of pregnant women in sub-Saharan Africa who were tested for HIV increased from 43% and in 2008 to 51% in 2009, significant progress in one year ( WHO/UNICEF 2010 ). AMREF has trained huge numbers of health care providers in Africa on Prevention of Mother to Child Transmission, Voluntary Counseling and Testing and Anti-retroviral Therapy. For the elimination of mother-to-child transmission of HIV; AMREF and its partners continue to pay maximum attention to expanding and sustaining PMTCT programmes in fixed health facilities and outreach programmes.
Homophobia, stigma and discrimination still persist and negatively affect the health and well-being of Men Having Sex with Men, and other most-at-risk populations. AMREF's work across the continent involves distribution of community-focused information and education materials for the reduction of stigma associated with HIV and AIDS, and strengthening the capacity of district and community structures to promote sexual and other behavioural risk reduction interventions.

AMREF advocates for universil access to ARV to all eligible patients and for more research to be done on ARV prevention and treatment. AMREF has mobilised resources from the Global Fund,, the US government through PEPFAR, SIDA, DFID and other donors for the expansion of universal access to ARVs and health services. A recent study funded by the National Institutes of Health has confirmed that treating HIV-positive people with ARV drugs reduces the risk of transmitting the virus to HIV - negative sexual partners by 96%.

Encouraging data from UNAIDS shows that new HIV infections and AIDS-related deaths have fallen to the lowest levels and more than 6.6 million people now have access to HIV treatment. However, these gains are threatened by a decline in resources available for HIV prevention and treatment in low- and middle- income countries. This could now be further aggrevated by the recently revised resource forecast, which shows a shortfall in funding available through the Global Fund.
For more information on AMREF's work in HIV and AIDS, visit: www.amref.org




Friday 18 November 2011

AFRICA TELE-DERMATOLOGY PROJECT

Hey! CHECK HERE! Best Forex taders worldwide, give you advice for FREE to buy or sell. ZuluTrade converts this advice to a live trade in your broker account automatically, again for FREE! Unique service to ensure that you make money in foreign currency trading.

The purpose Africa Tele-dermatology Project is to establish a virtual collaboration between African partners, the USA and Austria. A unique online archive of tropical skin conditions will also emerge which should serve as an internet source of educational material for training and updating of medical specialists and health personnel. A secondary aim of the project is to establish and secure an active channel and platform for dermatological research collaboration. The African partners currently involved are :-Uganda, Botswana, Malawi, Swaziland, Burkina Faso and Lesotho. The project applies Tele-medicine to fulfill its objectives.

Telemedicine utilizes modern telecommunication technology to provide medical services at a distance by connecting two or several medical centers and enabling exchange of expert medical information. Telemedicine has therefore a potential to offer developing countries qualitative and quantitative improvements in medical care.

The inherent visual nature of dermatology makes Tele-dermatology easily applicable to virtual medicine. African Tele-dermatology has been created to provide dermatology support to all physicians, dermatologists, and health care workers in hospitals and clinics throughout Africa. This support is provided through Tele-dermatology consultation services, discussion pertaining to diagnosis and management of patients with skin diseases, links to educational resources and access to dermatologic curriculum created specifically for African sites.

African developing countries have only a very limited number of qualified dermatologists. Tele-dermatology has therefore, the potential to offer a prompt channel for long distance consultation and consequently provide means of improving medical care of skin diseases.

The scope of this project is the integration of the various aspects of Tele-dermatology and Tele-dermatopathology using best practice model, creating an innovation – and investment – friendly surrounding for the broad – scaled implementation of Tele-medical applications in Africa.

This project has been funded by the Commission for Development Studies, Austrian Academy of Sciences, ( originally Uganda – Austria Project) and the American Academy of Dermatology.

Project and Site Coordinators:-
Steven Kaddu, M.B. Ch.B, MD, Associate Professor, Department of Dermatology, Medical University of Graz, Austria.
Carrie Kovarik, MD, Assistant Professor, Dermatology, and Dermatopathology, University of Pennsylvania, Department of Dermatology, USA.



Project Advisors:-
Hon Pak, MD Chief- Information Technology Engineering Division, Tele-medicine & Advanced Technology Research Center, U.S. Army Medical Research and Material Command.
H. Peter Soyer, MD, FACO Chair 1 Dermatology Group School of Medicine – the University of Queensland Princess Alexandra Hospital, Brisbane, QLD4102, Australia.

Project Partners:-
Rainer Hofmann-Wellenhof, MD – Associate Professor, Department Dermatology, Medical University of Graz.
Gerald Gabler, Msc. Department of IT and Telecommunication, Graz University Clinics and General Hospital Graz, Austria.
Cesare Massone, MD Associate Professor, Department of Dermatology, Medical University of Graz.
Grace K. Mulyowa, MB.Ch.B Head of Dermatology, Mbarara University, Faculty of Medicine, Mbarara, Uganda.
Adeodata Kekitiinwa, MB.Ch.B, M.Med, Associate Professor, Baylor College of Medicine, Children’s Foundation – Mulago Hospital, Kampala, Uganda.
Fred Kambugu, MB.Ch.B, M.Med, Head, Department of Dermatology, Makerere University, Faculty of Medicine, Kampala, Uganda.

Collaborating Institutions:-
University of Pennsylvania – Department of Dermatology, Philadelphia, USA.
University of Graz, Department of Dermatology, Austria.
Mbarara University of Science and Technology, Uganda.
University of Botswana.
Makerere University, Uganda.
Penn-Botswana Program, Baylor International Pediatric AIDS Initiative (BIPAI)
The University of Queensland, Brisbane, Australia.




HOW TO PROTECT YOURSELF, FAMILY AND PROPERTY

(1)HOW TO PROTECT YOUR HOME FROM INTRUDERS

Safety At Your Front Door
1. Never automatically open your front door. Make sure you know your caller’s identity before admitting them.
2. If the person at your door is a stranger, ask for identification to be passed under the door. If they are unable to do this, do not admit them.
3. It is advisable to have a wide angle viewer (peep-hole) in the door so that you can check a person’s identity without having to unlock your door.

Home Safety
1. All doors in your home leading to the outside should have dead-bolt locks.
2. When away at night, leave a light on.
3. Do not leave a key over a door or under a mat or carpet.
4. The single lock on a garage door is inadequate to keep intruders from prying up the opposite side and crawling in. Use a padlock. But never leave it unlocked. This is an invitation to have the padlock removed so that a key can be duplicated,
And the lock returned to its position. Later, the burglar returns when no one is at home and enters at their leisure using “their” key.
5. Mark your valuables and keep an accurate record of all your most valuable possessions.
6. When leaving on a trip:
A. Stop all deliveries.
B. Connect a light to a timer.
C. Notify the police and have a neighbor check your home periodically.
D. Have someone maintain your lawn.
7. Be a concerned neighbor. If see a suspicious person, car or situation, contact the police.

Safety For The Apartment Dweller
1. If you live in an apartment building with an intercom system to the front door, make sure the landlord keeps it in operating order.
2. Never admit anyone unless you are expecting them or you know them.
3. Never admit anyone to the building who is there to see another tenant or to deliver something to another apartment.
4. Anyone asking admission so that they can do some work for another tenant should not be admitted, but should be referred to the building’s manager.
5. If you see someone in your building who looks out of place or is acting suspiciously, contact the police.

(2)HOW TO PROTECT YOURSELF ON CITY STREETS

Street crime is on the increase in most large cities around the world. It is also becoming more prevalent in small communities. The following list of “safeguards” will help protect you – and may even save your life!
1. When leaving home, make sure that all doors and windows are locked – including the garage door.
2. Watch out for loiterers and do not carry large sums of money.
3. If possible, travel with another person. This is especially true after dark.
4. When carrying a purse, women should have only 3 or 4 one dollar bills placed inside. Credit cards, currency, driver’s license, keys, and jewelry should be carried in a coat or sweater pocket or concealed on your person to reduce the opportunity of large losses. If you carry a purse, don’t wrap the strap around your shoulder, neck or wrist. If your purse is grabbed, a strong strap will not yield easily and you may be injured. Some purse snatch victims have been thrown of f balance and received concussions, broken hips, arms or legs. Don’t carry anything more valuable than you can afford to lose. Always leave all unnecessary credit cards at home. When you shop and a purse, put it in your shopping bag.
5. At night, travel only in well – lighted and well – traveled streets.
6. Never hitchhike or accept rides from strangers.
7. Walk on the side of the street nearest to on coming traffic. If accosted by someone in a car, run in the direction opposite the way the car is headed.
8. Beware of people who approach asking directions; keep a polite but safe distance.
9. A good suggestion for men is to carry a second wallet containing a few $1.00 bills and old expired credit cards, which are normally destroyed or discarded. If confronted at knife or gunpoint, give the suspect the second wallet and concentrate on a good physical description to help the police in making arrest.
10. Upon returning home, particularly after dark, do not linger at the entrance of your residence. Make a quick check for mail or newspapers, and enter immediately. If you feel something is strange, don’t enter but go elsewhere and call for police assistance.
11. If you feel someone is following you, go to the nearest occupied residence or building, and ask for assistance. If you are confronted with a dangerous situation, cry out for assistance. Yelling “FIRE! FIRE!” instead of “Help” will generally bring faster attention.

(3)HOW TO PROTECT YOUR VALUABLES FROM THEFT

One of the most effective tools you can use to retrieve property stolen from your home is a simple electric engraving pen. With this pen you can inscribe your name or a number on most valuable items in and around your home. Before you do this, check with local police to see which they prefer you to use – your name, driver’s license, social security number or whatever.

Engraving your name or number on your valuables helps deter robbery in two ways: first, you discourage the thief since marked property is much more difficult to sell. Second, if a thief does steal your property, it is much easier to catch and prosecute them when they are discovered with goods in their possession that are easily identifiable as stolen.

Billions of dollars worth of property stolen each year is never returned to owners. Why? Because without some identification mark or number, the police are unable to verify stolen property or trace the owner. More than half the property recovered by the police is eventually auctioned off or destroyed because the goods have no identifying characteristics.

In some cities, local law enforcement agencies will lend you and your neighbors and engraving pen free. In these communities, you may borrow an engraving tool for several days. If this service is not available to you, you can purchase an inexpensive electric pen from your local hardware store for as little as $10 to $15. This small investment could be worth a great deal more to you at a later date.

Items already marked with a serial number – such as cars, TV’s, cameras, computers, mobile phones, appliances, etc., may not have to be engraved with your name or personal number. Check with local police first. If they recommend you inscribe your identifying mark on serialized items, inscribe this information just above the manufacturer’s serial number.

On unserialized property, inscribe your name or number on the upper right corner of the rear or backside of each item. Should you decide to sell or discard the item, at a later date, you should invalidate your number by using the engraving pen or any other sharp tool to draw a single line through your name or number from the upper left to the lower right hand corner. Do not deface your name or number in any other way. It is also advisable, when selling “marked” property, to write out a simple receipt and specifying on it that you were the previous owner and indicate the name or number used by you. This could prevent legal hassles for the new owner at a later time.

To protect smaller valuable items such as jewelry, silverware, etc., it is wise to take a photo of each item. A simple instant – type camera photo is sufficient.

After you have marked and/or photographed all your valuables, make a detailed list of these items and keep it in a safe place. When new items are acquired, add them to your list. As other items are sold or discarded, cross them off the list.

If you use credit cards, they should also be recorded on your list. Either copy your account number from each card and expiration date, or you have photo copies made for your records.

(4)HOW TO PROTECT YOURSELF WHEN TRAVELING

Safety On Public Transportation-
1. When waiting for a bus streetcar, stand near others who are also waiting.
2. If the immediate area is deserted or in darkness, stand near an occupied building on a lighted area until transportation arrives.
3. Once on the bus or streetcar, be aware of those around you. If someone looks or acts suspiciously, notify the driver.
4. If the coach is empty or nearly empty, sit as far up front and as close to the driver as possible.
5. If someone begins to bother you, get up and notify the driver immediately.
6. Upon arriving at your stop, be aware of those who alight with you. If you feel you are being followed, go to the nearest occupied building and ask for assistance.
7. After dark, attempt to get off the bus in well – lighted areas. Use only well – lighted streets to reach your destination.

Auto Safety-
1. Make certain your car is always in good working condition, with safe tyres and an adequate amount of gasoline for your planned trip.
2. Always check your car before getting in – to make sure no one is hiding inside.
3. If you have a garage, be sure you lock the door as you leave. To learn about the most suitable garage door protection, read “How To Protect Cars, Bicycles, and Motorcycles” later in this post.
4. It is best to park in attended lots. If you must leave a key with the attendant, leave only the ignition key. In all other cases, lock your car.
5. Do not leave packages or personal items in open view in the car…place them in the trunk (boot).
6. At night, pack only in lighted areas.
7. If you are in danger of being harmed or robbed, while in your car, start sounding your horn until assistance arrives.
8. Never pick up a hitchhiker.
9. If you have a flat tire in an area you feel might not be safe, try to keep driving until you reach a safe location.
10. If you feel you are being followed, drive to the nearest police or fire station, or open filling station.

Elevator Safety-
1. Observe elevator interior before entering. Wait until the next elevator if you are uncertain of any occupant.
2. Females riding the elevator alone should always stand near the control panel. If accosted, press ALL buttons.
3. If a suspicious person enters the elevator, exit before the door closes.
4. Before exiting from the elevator, observe the corridor for suspicious activity.

(5)HOW TO GUARD AGAINST PURSE SNATCHERS

Purse snatching is a crime of opportunity. You can eliminate that opportunity. Every female carrying a purse is a potential target. Senior citizens are especially susceptible to these criminals since they may not be readily able to defend themselves and pursue their assailants.

What You Can Do-
Purse snatching is a crime that can be easily prevented when you take away the opportunity from the thief. Most purse snatchers are juveniles under the age of 18, who are waiting for next opportunity. When you hide the “prize” you protect yourself!

Suppose you are going shopping and waiting for the bus. You are by yourself and your purse is exposed and in open view. You already made two mistakes – you’re alone and your purse is vulnerable. Frankly, your personal safety might depend on NOT clinging to that purse, even though it seems a normal way to protect the contents. Grabbing and shoving that may take place can result in being injured. There are ways to protect yourself, however.

Shop With a Friend, Travel Together-
The first precaution you can take is to go shopping with a friend – man or women. You are safer when in the company of someone else. If you must be out at night alone, stay in well – lighted areas. Walk close to street lights, staying well away from dark corners, alleys and building entrances.

How To Outsmart The Purse Snatcher-
When carrying a purse, women should have only 3 to 4 one dollar bills placed inside. Credit cards, currency, driver’s license, keys and jewelry should be carried in a coat or sweater pocket, or concealed on your person to reduce the opportunity of large losses. If you carry a purse, don’t wrap the strap around your shoulder, neck or wrist. If your purse is grabbed, a strong strap will not yield easily and you may be injured. Some purse snatch victims have been thrown down and have received concussions and broken bones. Never carry anything more valuable than you can afford to lose. Always leave all unnecessary credit cards at home. When you shop and carry a purse, place it in your shopping bag. Never leave your purse on a store counter or in a grocery shopping cart – even for a moment.

Don’t Carry Weapons That Can Be Used Against You-
You should carry a police whistle and a small flashlight on your key chain where they are readily available. Make a habit to carry your key chain in a pocket – not in your purse. And you should never put your name and address on your house keys or car keys. This is a simple way of telling the thief who you are and where you live.

Call The Police Immediately-
Most victims are attacked from behind. They don’t get a good look at the attacker. And when a juvenile gets away with it once, he’ll try again. If attacked, call the police immediately. Try to remember all details – help your police help you!

(6)HOW TO PROTECT YOURSELF FROM ARMED ROBBERY

While a purse snatching is one of today’s most common crimes facing women, strong arm robbery (hold – ups, mugging) is the most prevalent act where men generally are the victims.

By observing the basic rules of “common sense” your chances of being victimized are greatly reduced. Since most strong arm robberies occur during the hours between sunset and sunrise, the best rule to follow is simply stay inside at night. However, to even consider being confined to a secure area after the sun goes down is not only impossible, it is also ridiculous. By observing basic precautionary measures, chances of your becoming a robbery victim are greatly reduced. Here are some general rules to follow:
1. Travel in well – lighted streets. Avoid dark corners, alleys and entrances to buildings. Always try to walk on the side of the street nearest oncoming traffic.
2. If you must travel at night regularly, don’t carry more than you can afford to lose. One suggestion is to carry a second wallet containing a few $1.00 bills and old credit cards, which are normally destroyed or discarded. If confronted at knife or gunpoint, give the suspect the second wallet and concentrate on a good physical description to give to the police.
3. There’s safety in numbers! If possible, walk with a companion – either male or female. An armed robber is less likely to confront two or more, than a lone individual.
4. When waiting for a bus or streetcar, try to select a well – lighted area. Aim for a bus stop where people will be coming and going.
5. Don’t hitchhike or accept rides from strangers.
6. Avoid taking shortcuts through deserted areas such as parks, playgrounds, vacant lots, etc.
7. Be cautious when entering your car – someone may be hiding inside. Or when leaving your car – someone may be waiting. Park in well – lighted areas.
8. Never carry weapons that can be used against you.
9. If someone asks for directions, keep a polite but safe distance.
10. If you are alone and think that you are being followed, head for an occupied building such as bar, restaurant, filling station, fire station, etc. if none is available, cross the street in the middle of the block. If there is street vehicular traffic, try stop a car for help.

If You Are Confronted
1. DO NOT RESIST! Cooperate! Give the criminal whatever he asks for – wallet, keys, jewelry, credit cards or whatever. Your life is more valuable than replaceable possessions.
2. Don’t make any sudden, unexpected moves. A nervous criminal may think you are reaching out for a concealed weapon.
3. If the suspect claims he has a gun, knife, razor or whatever in his pocket, never try to force his bluff.
4. Never try to be a hero and try to apprehend the criminal yourself.
5. Notify police as soon as possible.

(7)HOW TO PROTECT YOURSELF FROM PICKPOCKETS

The “art” of picking pockets is one of the world’s oldest professions. Author Charles Dickens’ Artful Dodger is probably among the best known pickpockets. However, all are not juveniles – and all are not males.

The skilled pickpocket is not the seedy character you’d expect to find lurking in a dark doorway. He (or she ) appears about as average as you and I in appearance and manner. Because they make a study of how to “blend” into the crowd, pickpockets usually remain undetected and can practice their activities with little hindrance.

Pickpockets follow no regular schedule. They operate equally well during daylight hours as well as at night. And if you have been led to believe that picking pockets takes place only in crowds, forget it! The only known fact is that they generally focus on the public during times when they may be carrying more money than usual, such as during pre- holiday spending sprees, stores sales, at fairs, carnivals, horse races, gambling casinos, near bank entrances, etc.

While many pickpockets work alone, there are also teams of two or three which sometimes involve female accomplices. A team with nimble fingers of a female is next to impossible to apprehend. The first team member removes the valuables from the unsuspecting victim’s pockets. She then passes them on to the next member who quickly disappears. She then generally engages the victim in conversation to distract or delay his attention.

Contrary to what most think, experienced pickpockets do not place their hands all the way into the victim’s pockets. Rather, the expert criminal reaches into the top of the pocket, takes up a pleat in the lining, then makes a dozen or so more tiny pleats, folding the lining with swift dexterity between his fingers. The shortening pocket lining moves the valuables upward so that they emerge at the mouth of the pocket. The entire act takes place in a second or two.

The best protection for foiling pickpockets is to remove the opportunity of becoming a victim…..

For Men:
1. The target areas are back trouser pockets, and suit coat and sports jacket pockets, located inside and out. A pickpocket who values his freedom front trouser pockets, especially buttoned or zippered pockets.
2. If it is necessary to carry your wallet in unbuttoned pants, coat, or jacket pocket, be sure it contains only what you can afford to lose. Keep large sums of money, credit cards, ID’s etc. in your front pocket or zippered pocket; keys on a chain attached to your clothing.
3. Never “pat” your pocket to see if your wallet is still there. This notifies the criminal of the location of your valuables.
4. Larger size “pocket secretaries” are especially inviting to pickpockets – and relatively easy to steal from.

For Women
1. Do NOT carry your wallet in your purse. Conceal it in a coat or sweater pocket where it does not show bulge.
2. Use a purse that is difficult or time consuming to open.
3. Never let your purse lie unattended on a store counter or in a grocery shopping cart.
If you have been victimized by a pickpocket, immediately notify police and give the best description you can.

(8)HOW TO SAFEGUARD AGAINST RAPE

If you are a female, chances are 1 in 10 that you will be a victim of sexual assault. The attacker makes no distinction between age, race, appearance or any other characteristics.

Common sense is your best defense against attack. Because every rape is different, there’s no one solution for thwarting an attack.

If you are attacked, evaluate the situation and look for ways to escape. Some women have avoided rape by talking their way out of it, acting crazy or fighting back. A kick in the groin isn’t usually successful because men instinctively protect this area, and you may lose your balance unless you’re a martial arts expert. If you decide to respond physically, remember that your first priority is to get away. Act quickly and derisively to throw the attacker off guard while you escape.

After an attack:
A. Go to a safe place.
B. Call the police.
C. Preserve evidence – don’t shower or douche; blood and semen are important evidence. And don’t change your clothes or disturb the scene of crime.
D. Get medical care.

Medical attention is vital! Many hospitals provide free care for rape victims and offer pregnancy prevention and venereal disease treatment. Remember, even if you do get treatment immediately, follow – up tests for sexually transmitted diseases are essential.

Never be embarrassed because of the incident. Though difficult to talk about, it is important to tell doctors what sex acts took place so they will know what medical attention is needed.

Try to remember in detail your exact experience, for police records. Give as accurate and complete description of your assailant as possible. This is extremely important! Your complete co-operation with local authorities may help in preventing similar attacks on other girls and women.

(9)HOW SHOPLIFTING AFFECTS YOU & YOUR FAMILY

One of the most common non – violent crimes facing the world today is – shoplifting. So prevalent is this problem, that most stores and shops automatically increase prices ( as much as 10%) to make up for these loses.

Shoplifters fall into several categories. First, there are the “professionals”. They make their living by stealing – most often to their “customers” specifications. They have to perfect their technique to operate…..to remove labels with scissors or razor blades, that could incriminate them if caught…..or by designing a “booster” box for stolen articles…or the expert use of “bad bags” (shopping bags)…or “booster” skirts or pants (ordinary appearing garments with baglike compartments inside)…plus dozens of other clever “professional’s tools”.

Some take things they could easily pay for and perhaps do not even want. These offenders may suffer from kleptomania, a neurotic, irresistible impulse to steal. This is almost never done for the purpose of acquiring the item taken. While these people may not necessarily be considered mentally ill, generally “kleptomaniacs” are emotionally disturbed.

The greatest number of shoplifters are “amateurs”. Usually, they have little money, few scruples & an intense desire to own luxuries. Psychologists say the four most common urges and emotions underlying these crimes are: (1) Profound feelings of guilt, (2) A wish to be punished, (3) A need to prove their worth and/or (4) an impulse to retaliate for real or fancied wrongs. These shoplifters are not necessarily ill or disturbed, they simply steal because it pays.

Whether the item taken is of little value (as a candy bar or a piece of bubble gum), or of greater value (as a mobile phone or camera) it is still shoplifting and it is still a crime. These crimes affect us all by being forced to pay higher prices.

How To Tell If Your Children Are Shoplifters
No matter how young children are, they must be taught to understand that to take anything without paying for it is a wrongful act. If a child does not realize this at an early age, it may set a pattern that could follow them into adulthood, with disturbing consequences. The simplest way to prevent a child from stealing is to watch them at all times while you are shopping and reprimand them when the act takes place. If this fails, take them to the store manager or other authoritative personnel and say something like “my son took this. Will you please tell him what happens to people who steal”.

Naturally, it is a more serious problem when teenagers and adults engage in shoplifting. A friend or a family member may be extremely secretive, but if they engage in shoplifting regularly, there are usually giveaway clues as to their activities: (1) Extra unexplained income, (2) Possession of luxuries you know they cannot afford, (3) Secretive habits during certain times of the day, and/or (4) Lavish gifts on friends and acquaintances.

When You Discover a Shoplifter
If it’s a stranger in the illegal act, notify store personnel. If it’s a friend or family member, warn them first. If this fails, convince them to see a doctor. As a last resort, you may have to notify police, to save them from ridicule, disgrace and extreme hardship later on.

(10)HOW TO PROTECT CARS, BICYCLES, MOTOR CYCLES

How To Protect Your Car
Always lock your car doors. Be certain all windows are completely closed. When driving, keep all doors locked. It is best to park in attended lots. If you must leave a key with the attendant, leave only the ignition key. In all cases, lock your car. At night, park only in well – lighted areas.

If you have a garage, the single lock on the door is inadequate to keep intruders from prying up the opposite side and crawling in. One of the three may be used to secure the door: (1) Add another bolt and padlock on the opposite side, (2) Install a pair of cane bolts to the inside – only operable from the inside, or (3) Add a top center hasp.

In every case, use a minimum standard exterior padlock. Don’t hide a key outside. Most hiding places are obvious to the burglar.

Never leave a padlock unlocked. This is an invitation to have the padlock removed so that a key can be made, and the lock returned to its position. Later, the burglar returns when no one is home and enters at his leisure using “his” key.

How To Protect Bicycles
You don’t leave your car unlocked, so treat your bicycle the same way. Use an approved chain and padlock whenever you are not on the seat! Lock it to the garage – a 3/8” x 6” eye screw fastened to a stud. The eye screw should be at least 3 feet above the floor, because this makes using a pry bar much more difficult.

Whenever you lock your bike in a public place, chain it to a secure rack or stanchion through the frame and a wheel. Keep the chain as high above the ground as the bike will allow. This reduces the leverage for a pry bar or bolt cutter attack.

MINIMUM STANDARDS FOR APPROVED CHAIN – Must be at least 5/16” hardened steel alloy. Links must be of continuous welded construction. Lighter chain or chain with open links simply will not withstand bolt cutting attacks. Don’t GIVE your bicycle away! Using anything less will invite its theft.

How To Protect Motor Cycles
These expensive bikes require additional security measures. They must be secured with a mated 3/8” hardened steel alloy chain and a padlock of equal strength. Sheathed cable has not proven to be a satisfactory deterrent to theft.

LIGHTING – Good exterior lighting is important, particularly when the yard area is obscured by, high non – removable shrubbery. The best possible location for outside lights is under the eaves. This makes ground level assault more difficult. You can buy an inexpensive timer or photo-electric cell which will automatically turn the lights on at a dusk and turn them off at dawn.

(11)HOW TO PROTECT YOUR HOME WHILE AWAY

Be sure to lock before you leave, and let a neighbor have a key. When leaving your home, practice the following advice – it could pay big, big dividends.

Going To The Market Or Out To Dinner?
A residence which presents a “lived – in” appearance is a deterrent to burglars. Never leave notes that can inform a burglar that your house is unoccupied. Make certain that all windows and doors are secured before departing. An empty garage advertises your absence, so close the doors.

When going out at night, leave one or more interior lights on and perhaps have a radio playing (TV sets should not be left unattended). Timers may be purchased that will turn lights on and off during your absence.

Do not leave door keys under flower pots or doormats, inside an unlocked mailbox, over the doorway, or in other obvious places.

When Planning Vacations Or Prolonged Absences –
Discontinue milk, newspaper, and other deliveries by phone or in person ahead of time. Do not leave notes.

Arrange for lawn care and have someone remove advertising circulars and other debris regularly. On the other hand, several toys scattered about will create an impression of occupancy.

Notify the post office to forward your mail or have a trustworthy person pick it up daily. Apartment house tenants should also heed this hint since stuffed mail receptacles are a give – away when no one is home.

Inform neighbors of your absence so they can be extra alert for suspicious persons. Leave a key with them so your place may be periodically inspected. Ask them to vary the positions of your shades and blinds.

When you leave, do not publicize your plans. Some burglars specialize in reading newspaper accounts of other people’s vacation activities.

If you find a door or window has been forced or broken while you were away, DO NOT ENTER. The criminal may still be inside. Call the police immediately.

Do not touch anything or clean up if crime has occurred. Preserve the scene until police inspect for evidence.

ALWAYS REMEMBER TO -
1. Lock before you leave.
2. Trust a neighbor with a key.
3. Be a concerned neighbor – yourself.

(12)HOW TO BURGLAR – PROOF YOUR DOORS

The majority of devices mentioned in this report cost very little. All of them will help reduce burglary and make your house or apartment more secure.

Begin with a home “security” check. Start with the front door and work clockwise around the entire inside of your home, finishing with the back yard, fence and shrubs, gates and garage.

Shrubbery should never block the view of your front door. This allows an intruder the opportunity of privacy to gain entrance. A wide angle viewer in the door lets you know your visitor in advance. This item is recommended over a chain lock.

Locks, Bolts, and Hinges –
A DEAD – LATCH is an inexpensive lock set which keeps the burglar from simply slipping your door open with a plastic credit card. This method of entry is common in many areas, but very easy to prevent.

AUXILIARY DEADBOLT: 1” deadbolt, single cylinder with hardened cylinder guard, and thumb turn.

For extra security, a single cylinder deadbolt lock, with one inch throw and case – hardened insert, is recommended for all exterior doors. If you have easily breakable glass within 40 inches of a deadbolt lock, it should be augmented with a stronger type of glass or plastic to provide adequate security.

Most police departments do not recommend deadbolt locks for residential use. You may be adding additional security at the expense of personal safety with a double cylinder deadbolt. For example, you could lock yourself in and not be able to escape in case of fire or other emergency.

THE RIM LOCK is a1” deadbolt lock which is installed on the inside surface of the door. It is less expensive than other types of locks, but equally effective for security.

THE “JIMMY – PROOF” RIM LOCK is another lock which is installed on the inside surface of the door. But this lock has vertical deadbolts, which is an approved locking device.

CANE BOLTS: ½” in diameter by 12” high installed at the top & bottom of the inactive door offers minimum security. Many homes with pairs of doors, use half – barrel slide bolts on the inactive door. These are weak and totally inadequate.

FLUSH BOLTS: installed at the top and bottom of the inactive door or a pair of doors, flush bolts offer additional security, since the intruder cannot get at these devices to tamper with them if the doors are locked.

HINGE PROTECTION: some exterior doors are improperly installed so that the hinges are installed from outside. To protect such a door from being lifted from its hinges by pulling the hinge pin, follow these simple steps:
1. Remove two screws, opposite each other, from both leaves of the hinge.
2. Insert screw or concrete nail into jamb leaf, protruding ½”.
3. Drill out the opposing screw hole in the door. Do this in the top and bottom hinge of the door. When closed, the hinge pins may be removed, but the door will remain firmly in place.

(13)HOW TO BURGLAR – PROOF YOUR WINDOWS

Many burglars enter homes by simply breaking glass windows. A good deterrent is to have better quality glass installed at vulnerable points around the perimeter of your residence. Most burglars avoid attempting to break the following types of glass due to the fear of attracting attention.
LAMINATED GLASS is made by a vinyl or plastic interlayer sandwiched between two layers of glass. This type of glass adds additional strength to your windows. To gain entry, a burglar would have to have to strike the glass repeatedly in the same spot in order to make a small opening. Most burglars are reluctant to create this type of noise for fear of being detected.

TEMPERED GLASS is made placing a piece of regular glass in an oven, bringing it almost to the melting point, and then chilling it rapidly. This causes a skin to form around the glass. Fully tempered glass is four to five times stronger than regular glass.

WIRED GLASS adds the benefit of a visible deterrent. Extra effort will be needed to break the glass and then cut through the wire located within the glass, in order to gain entry.

PLASTCS: Plastic material is divided into two types: acrylic or polycarbonate. The acrylics are more than ten times stronger than glass of the same thickness and are commonly called Plexiglas. Polycarbonate sheets are superior to acrylics and are advertised as 250 times more impact resistant than safety glass, and 20 more times than other transparent plastic.

With SLIDING WINDOWS, the primary objective is to keep the window from sliding or being lifted up and out of the track. There are many manufactured products available for securing windows. Here are some suggestions:

PINNED WINDOW ANTI-SLIDE BLOCK SLIDEBOLT: It is not recommended that you lock a window in a ventilated position. This is an invitation to a prying action which can result in entry. Key locking devices offer no real security, and they can be a fire exit hazard.

CASEMENT WINDOWS are the simplest to secure. Make sure the latch works properly and that the “operator” has no excess play. If so, replace the worn hardware.

DOUBLE HUNG WINDOW latches may be jimmied open. If a window not used, screw it shut (except bedrooms). For windows in use, drill a sloping hole into the top of the bottom window, through into the bottom of the top window, and insert an easily removable pin or nail.

LOUVRE WINDOWS are bad security risks. Remove and replace with solid glass or other type of ventilating window. Or protect with a grate or grille (except bedrooms).

WARNING: One window in every bedroom on the ground and second floor must be left available as a fire exit, particularly for children and guests in your home. At night, the bedroom window may often be the quickest and safest means of getting out. Because of the danger of fire, decorative grilles are not recommended on bedroom windows.

(14)HOW TO SELECT A BURGLAR ALARM

Burglars dislike noise – it attracts attention. A barking dog is the best deterrent in preventing burglaries. However, a watch dog cannot always be depended upon. Some professional burglars have been known to carry delectable “dog snacks” in their pockets – and with full stomach, some watch dogs make friends easily and forget their purpose of guarding the premises. The most reliable safeguard to protect your home and possessions is a reliable alarm.

Many types of burglar alarms can be obtained for residential use. It is advisable, however, that basic hardware security measures be followed first. If additional security is desired, the following recommendations could be helpful.
1. Obtain estimates from three alarm companies, notifying each of this procedure.
2. An audible alarm is recommended over silent alarms for residential use in order to first protect persons and secondly, property.
Don’t depend entirely upon an alarm system to protect you – be sure to use proper locking devices. Any alarm system should include:
A. A battery – powered fail – safe back – up.
B. Fire – sensing capability.
C. Read – out ability to check working of system.
D. Horn sounding device installed in attic through vent.
When shopping for an alarm system, take this list with you.

SECONDARY BARRIER –
If the value of small personal items warrants protection, a secondary barrier is an additional safeguard. On a hinging closet door, install a 1” deadbolt lock. Store your jewels, furs, cameras, guns, silverware, and other valuables behind this barrier. Be sure to “pin” the hinges (as outlined in “How To Burglar – Proof Your Doors” discussed earlier).

(15)HOW TO REDUCE CRIME IN YOUR NEIGHBORHOOD

While we don’t like to talk about it – or even think about it – crime is on the increase all over the world. The number of burglars, muggers, auto thieves, robbers, purse snatchers, etc. is growing at an alarming rate. Now you, as a resident, working with neighbors can help reduce the crime rate.

How? By organizing and/or joining a neighborhood program in which you and your neighbors get together to learn how to protect, yourselves, your family, your home, and your property. Working together, you can get the criminals off your block and out of your area.

There is safety in numbers and power through working with a group. You’ll get to know your neighbors better, and working with them you can reduce crime, develop a more united community, provide an avenue of communications between police and citizens, establish on-going crime prevention techniques in your neighborhood, and renew citizen interest in community activity.

“Citizens Safety Projects” are set up to help you do this. It is a joint effort between private citizens and local police. Such programs have been started all over the world. May be one already exists in your community.

These organizations don’t require frequent meetings (once a month or so). They don’t ask anyone to take personal risks to prevent crime. They leave the responsibility for catching criminals where it belongs – with the police. This is NOT a “vigilante” group.


These groups gather citizens together to learn crime prevention from local authorities. You cooperate with your neighbors to report suspicious activities in the neighborhood, to keep an eye on homes when the resident is away, and to keep everyone in the area mindful of the standard precautions for property and self that should always be taken. Criminals avoid neighborhoods where such groups exist.

Through cooperation with local law enforcement agencies, some of the things you will learn – all free – are:
1. What to do in an emergency.
2. How to best identify a suspicious person.
3. How to identify a vehicle being used in a suspected criminal activity.
4. Signs to watch out for before entering a house or apartment that may be in the process of being burglarized.
5. What to do in case of injury.
6. What to do about suspicious people loitering in your neighborhood.
7. How to identify stolen merchandize.
8. How to identify auto theft in progress.
9. How to protect your house or apartment.
10. How to recognize a burglary in progress.
11. How to protect yourself and family – and much more.
It’s easy to get your group started. All you have to do is contact your neighbors, and arrange a date, place, and time for the first meeting. Hold the meetings at your home or that of a neighbor. Try to plan a time that is convenient to most of your neighbors – preferably in the evening.

Then call your local police department. They will be happy to give your group informal lectures, free literature – and in many instances, window stickers and I.D. cards. Remember, police officers can’t be everywhere all the time. Your cooperation with them is for the benefit of you, your family, your neighbors and your neighborhood.



Monday 14 November 2011

ANTIRETROVIRAL DRUGS

Hey! CHECK HERE! Best Forex traders worldwide, give you advice for FREE to buy or sell. ZuluTrade converts this advice to a live trade in your broker account automatically, again for FREE! Unique service to ensure that you make money in foreign currency trading.

DESCRIPTION
Lamivudine, Nevirapine and Stavudine tablets are for oral administration. Each tablet contains 150mg of lamivudine USP, 200mg of nevirapine USP and 30mg of stavudine USP. In addition, each tablet contains the following inactive ingredients: lactose monohydrate, corn starch, croscarmellose sodium, FD&C yellow # 6 / sunset yellow FCF AL, povidone, isopropyl alcohol, sodium starch glycolate, colloidal silicon dioxide and magnesium stearate.
Lamivudine (also known as 3TC) is a synthetic nucleoside analogue with activity against HIV-1 and HBV. The chemical name of lamivudine is (-) 2',3'-dideoxy,3'-thiacytidine. Lamivudine is the (-)enantiomer of a dideoxy analogue of cytidine. It has a molecular formula of C8H11N3O3S and a molecular weight of 229.3. Lamivudine is a white to off-white crystalline solid with a solubility of approximately 70mg/mL in water at 20 degrees C.

Nevirapine is non-nucleoside reverse transcriptase inhibitor (NNRTI) with activity against Human Immunodeficiency Virus Type 1 (HIV-1). Nevirapine is structurally a member of the dipyridodiazepinone chemical class of compounds. The chemical name of nevirapine is 11-cyclopropyl-5, 11-dihydro-4-methyl-6H-dipyrido [3,2-b:2',3'-e][1,4] diazepin-6-one. Nevirapine is a white to off-white crystalline powder with the molecular weight of 266.30 and the molecular formula C15H14N4O.
Stavudine (d4T) is a sythetic thymidine nucleoside analogue, active against the human immunodeficiency virus (HIV). The chemical name for stavudine is 2',3'-didehydro-3'-deoxythymidine. Stavudine is a white to off-white crystalline solid with the molecular formula C10H12N2O4 and a molecular weight of 224.2. The solubility of stavudine at 23 degrees C is approximately 83 mg/mL in water and 30mg/mL in propylene glycol. The non-octanol/water portion coefficient of stavudine at 23 degrees C is 0.144.

MICROBIOLOGY
Mechanism of Action:
Lamivudine is a synthetic nucleoside analogue. Intracellularly, lamivudine is phosphorylated to its active 5'-triphosphate metabolite, lamivudine triphosphate (3TC-TP). The principal mode of action of 3TC-TP is the inhibition of HIV-1 reverse transcriptase (RT) via DNA chain termination after incorporation of the nucleotide analogue into viral DNA. 3TC-TP is a weak inhibitor of mammalian DNA polymerases.
Nevirapine is non-nucleoside reverse transcriptase inhibitor (NNRTI) of HIV-1. Nevirapine binds directly to reverse transcriptase (RT) and blocks the RNA-dependent and DNA-dependent DNA polymerase activities by causing a disruption of the enzyme's catalytic site. The activity of nevirapine does not compete with template or nucleoside triphosphates. HIV-2 RT and eukaryotic DNA polymerases (such as human DNA polymerases) are not inhibited by nevirapine.
Stavudine, a nucleoside analogue of thymidine, is phosphorylated by cellular kinases to the active metabolite stavudine triphosphate. Stavudine triphosphate inhibits the activity of HIV-1 reverse transcriptase (RT) by competing with the natural substrate thymidine triphosphate and by causing DNA chain termination following its incorporation into viral DNA. Stavudine triphosphate inhibits cellular DNA polymerases and markedly reduces the synthesis of mitochondrial DNA.

Antiviral Activity:
Lamivudine - The cell culture antiviral activity of lamivudine against HIV-1 was assessed in a number of cell lines (including monocytes and fresh human peripheral blood lymphocytes) using standard susceptibility assays. In HIV-1-infected MT-4 cells, lamivudine in combination with zidovudine at various ratios exhibited synergistic antiretroviral activity.
Nevirapine - The antiviaral activity of nevirapine has been measured in a variety of cell lines including peripheral blood mononuclear cells, monocyte derived macrophages, and lymphoblastoid cell lines. Nevirapine had no antiviral activity in cell culture against group O HIV-1 isolates (n=3) or HIV-2 isolates (n=3) replicating in cord blood mononuclear cells. Nevirapine in combination with efavirenz exhibited strong antagonistic anti-HIV-1 activity in cell culture and was additive to antagonistic with the protease inhibitor ritonavir or the fusion inhibitor enfuvirtide. Nevirapine exhibited additive to synergistic ant-HIV-1 activity in combination with the protease inhbitors: amprenavir, atazanavir, indinavir, lopinavir, nelfinavir,saquinavir and tipranavir, and the NRTIs: abacavir, didanosine, emtricitabine, lamivudine, stavudine, tenofovir, and zidovudine. The anti-HIV-1 activity of nevirapine was antagonized by the anti-HBV drug adefovir and by the anti-HCV drug ribavirin in cell culture.
Stavudine - The cell culture antiviral activity of stavudine was measured in peripheral blood mononuclear cells,monocytic cells, and lymphoblastoid cell lines. In cell culture, stavudine exhibited additive to antagonistic anti-HIV-1 activity in combination with zidovudine. Stavudine in combination with either abacavir, didanisine, or tenofovir exhibited additive to synergistic anti-HIV-1 activity. The relationship between cell culture susceptibilty of HIV-1 to stavudine and the inhibition of HIV-1 replication in humans has not been establshed.

Resistance:
Lamivudine - Lamivudine-resistant variants of HIV-1 have been selected in cell culture. Genotypic analysis showed that the resistance was due to a specific amino acid substitution in the HIV-1 reverse transcriptanse at codon 184 changing the methionine to either isoleucine or valine (184V/I).

Nevirapine - HIV-1 isolates with reduced susceptibility to nevirapine emerge in cell culture. Genotypic analysis showed mutations in the HIV-1 RT encoding Y181C and/or V106A substitutions depending upon the virus strain and cell line employed. Time to emergence of nevirapine resistance in cell culture was not altered when selection included nevirapine in combination with several other NNRTIs.

Stavudine - HIV-1 isolates with reduced susceptibility to stavudine have been selected in cell in cell culture (strain specific) and and were
also obtained from patients treated with stavudine.

Cross - Resistance:
Lamivudine - lamivudine resistant HIV-1 mutants were cross - resistant to didanosine (ddl). In some patients treated with zidovudine (ZDV) plus didanosine, isolates resistant to multiple reverse transcriptanse inhibitors, including lamivudine have emerged.
Nevirapine - Rapid emergence of HIV-1 strains which are cross- resistant to NNRTs has been observed in cell culture. Nevirapine - resistant isolates were susceptible to the NNRTs, ddl and ZDV. Similarly, ZDV - resistant isolates were susceptible to nevirapine in cell culture.
Stavudine - Cross-resistance among HIV-1 reverse transciptase inhibitors has been observed. Several studies have demonstrated that prolonged stavudine treatment can selct and/ or maintain mutations associated zith zidovudine resistance.

CLINICAL PHARMACOLOGY

Pharmacokinetics in Adults:
The rate and extent of absoption of Lamivudine, Nevirapine and Stavudine from the combined tablets ( 150 mg / 200 mg / 30 mg ) were bioequivalent to that of Epivir tablets, Zerit capsules and Viramune tablets respectively, when administered to healthy volunteers in the fasted state.

Lamivudine:
Absorption and Bioavailability - Lamivudine was rapidly absorbed after oral administration in HIV - infected patients. The cumulation ratio of lamivudine in HIV-1 positive asymptomatic adults with normal renal function was 1.5 following 15 days of oral administration of 2 mg/kg twice daily.
Distribution - According to studies, lamivudine distributes into extravascular spaces. The volume of distribution is independent of dose and did not correlate with body weight. Binding of lamivudine to human plasma is low (<36%)). Metabolism - Metabolism of lamivudine is minor route of elimination. In man, the only known metabolite of lumivudine is the trans-sulfoxide metabolite. Serum concentrations of this metabolite have not been determined . Elimination - The majority of lamivudine is eliminated unchanged in urine by active organic cationic secretion. Nevirapine:: Absorption and Bioavailability - Nevirapine is readily absorbed (>90%) after oral administration in healthy volunteers and in adults with HIV-1 infection.
Distribution - Nevirapine is highly lipophilic and is essentially nonionized at physiologic pH. Nevirapine is widely distributed in humans. It readily crosses the placenta and is also found in breast milk.
Metabolism/Elimination - In vivo in humans and in vitro studies with human liver microsomes have shown that nevirapine is extensively biotransformed via cytocrome P450 (oxidative) metabolism to several hydroxylated metabolites. In vitro studies with human liver microsomes suggest that oxidative metabolism of nevirapine is mediated primarily by cytocrome P450 (CYP) isozymes from the CYP3A and CYP2B6 families, although other isozymes may have a secondary role.
Stavudine::
Absorption and Bioavailability - Following oral administration, stavudine is rapidly absorbed is rapidly absorbed, with peak plasma occuring within 1 hour after dosing.
Distribution - Stavudine distributes equally between red cells and plasma.
Metabolism - Metabolism plays a limited role in the clearance of stavudine.
Elimination - In HIV-infected patients, renal elimination of unchanged drug accounts for about 40% of the overall clearance regardless of the route of administration.

Effects of Food on Absorption of Lamivudine, Nevirapine and Stavudine - The extent of lamivudine, nevirapine and stavudine absorption following administration has not been evaluated. Therefore, Lamivudine, Nevirapine & Stavudine tablets 150mg/200mg/30mg should be taken under fasting conditions.