The Mommy Market #Sundayreading


Tulika offers books for children in Braille #DISABILITY

Books in Braille

Some of Tulika’s books are available in Braille. They have been adapted by Third Eye and are available through their website You can find out more about the books listed below through the book search option on our website.


Mukand and Riaz
The King and the Kiang
Who Will Rule?
Putul and the Dolphins
A Silly Story of Bondapalli
Brahma‘s Butterfly
The Snow King’s Daughter
Hanuman’s Ramayan
Vyasa‘s Mahabharata
Pavo Cavo
Pintoo and Giant


Mukand and Riaz
The King and the Kiang
Who Will Rule?
Putul and the Dolphins
A Silly Story of Bondapalli
Brahma’s Butterfly
The Snow King’s Daughter
Hanuman’s Ramayan
Vyasa’s Mahabharata
Pavo Cavo
Pintoo and Giant

Hindi Titles

Mukand and Riaz
The King and the Kiang
Who Will Rule?
Putul and the Dolphins
A Silly Story of Bondapalli
Brahma’s Butterfly
The Snow King’s Daughter
Hanuman’s Ramayan
Vyasa’s Mahabharata
Pavo Cavo
Pintoo and Gian


Cyber-Safety Savants Say Less is Best Online

By Mitzi Perdue

WeNews correspondent

Wednesday, May 16, 2012

Cybercriminals may be “spear phishing” your Facebook or Twitter account. A gorgeous PowerPoint attachment may harbor a malicious program. Women are more vulnerable to online security breaches, so here are a few words from the Web-wise.

(WOMENSENEWS) — “Celebrating my birthday tonight at Alfredo’s!”

If a woman posted that on her Facebook page it would worry MIT-trained cryptographer Mark Herschberg.

“Your Facebook/Twitter status and photos say a lot about you,” says the New York-based cybersecurity expert. “A determined person may already have found out that you’re a woman, learned where you live and whether you live alone. With that post, the bad guy now knows that you’re not home. That post could set you up for a robbery or even a physical attack.”

While the dangers of a physical attack are not large, Herschberg says it’s prudent to remain cautious and minimize the risk. Not only that, Herschberg adds that with such a Facebook status update, “the bad guy now knows it’s your birthday, and if he’s a determined cybercriminal, this could help him hack your identity.”

But do you really need to worry if you keep your Twitter and Facebook accounts private?

Herschberg’s answer: “Even if you have your privacy settings set to friends of friends, some of those friends might be easygoing and accept all friend requests, and now you have a hole in your security. Cybercriminals are out there, looking to exploit those kinds of holes.”

A big part of cybercrime is identity theft, which allows criminals to get information about your “secure” online accounts and either withdraw money from your bank or run up charges on your credit accounts.

Identity theft is a serious hazard for everyone, but it’s particularly costly for women. Seventeen percent of female identity theft victims have lost $1,000 or more due to the crime, versus 10 percent of males, according to the Affinion Security Center, based in Stamford, Conn.

Spear Phishing Pointers

Herschberg also warns about “spear phishing,” a new tactic used by cybercriminals to exploit your social media information against you.

Unlike traditional spam or phishing, which sends messages to a broad number of people, spear phishing is highly targeted at you. A sender may impersonate a friend or colleague and send a message based on details gleaned from your social media accounts. The message may invite you to a conference on a topic that interests you, or ask you to check out a report on a topic they’ve learned is important to you.

The goal is to trick you into clicking on an infectious attachment or visit a malicious website so the cybercriminals can get sensitive information such as passwords. If this happens, Herschberg recommends contacting your friend or associate to ask if they really did send the e-mail.

Jody Westby heads Global Cyber Risk, a cybersecurity company in Washington, D.C. Since women are often the ones to discuss safety with their children, she says it’s important not to forget talking about online privacy as part of this discussion.

“Today children need to know not to give out their full name, or where they go to school, or their phone number when online unless they know the person,” she says.

Brian Krebs, an Internet security journalist in Washington, D.C., says to also beware of financial risks lurking in sudden, strange messages. “A hallmark of a malicious program is they try to get you to act quickly,” he says. For example, “Your credit card has expired. Click this link immediately or we will cancel your account.”

Krebs recommends, “If you get an e-mail that purports to be from your bank and asks for information, or asks you to click a link and log in, it is very often a scam or a trap. If you have questions about whether one of these e-mails addresses a real problem, call your financial institution. Do not reply to the message or take any other action!”

Pause First

It’s never a good idea to respond to spam, but if it comes from your friend or family, it can be tricky. It might be real or it might mean an account was just hacked.

So pause when you get e-mails that seem to come from a friend or relative or co-worker with short messages like, “Hey, check out this movie I saw, it’s really funny,” or “OMG! There’s a video of you posted online that’s awful!” or “Check out the attached file!”

Like Herschberg, Krebs recommends writing back and asking, “Did you send this?”

Krebs predicts that in a disconcerting number of cases, the intent of the message wasn’t at all friendly.

He also cautions against forwarding chain letters of the sort that tell you something wonderful will happen if you send it to 10 of your friends. Chain letters are often generated by spammers as an exceptionally effective way for them to harvest current addresses. The chain letters are carefully worded to touch your heartstrings or religious beliefs, but don’t forward them unless you’re wishing more spam on yourself and your friends.

Chain letters that have PowerPoint presentations of, for example, irresistibly beautiful scenes from China or scantily clad women from Russia, may have malicious programs hidden behind them that can take control of your computer.

Almost everyone in cybersecurity says to exercise extreme caution when opening attachments or clicking links. As Krebs says, “It may be good for instant gratification, but it can also be good for an instant bad day.”

Additional Advice

1. Change your passwords every 90 to 180 days.

2. Don’t use the same password for different accounts. If someone is able to crack one password, you don’t want him or her to be able to attack all your accounts.

3. Choose passwords that have a combination of numbers and upper and lower case letters. (One lady at the Fifth Avenue Apple Store in Manhattan uses the address of her dog’s vet preceded by her first boyfriend’s initials, so it comes out something like this: BAF348W94th. Three months later, she’ll change it to her dentist’s address and still later, she’ll use the address of a local restaurant.)

4. Be careful about using passwords on public computers, which could have spyware or key loggers installed on them.

5. Keep all your software up to date, especially JAVA, which is a vector for malware.

6. If you have an iPhone or an iPad, activate their password protection. There are thieves in major cities who specialize in targeting people with iPhones or iPads in order to harvest information to sell to identity thieves.

Assuming you have virus protection software, you’re part way to cybersecurity, but your computer with software protection is like a castle surrounded by a mote. The software can protect you, but not if you lower the drawbridge and open the castle gate.

iEmpire: Apple’s Sordid Business Practices Are Even Worse Than You Think

Apple Inc.
New research goes beyond the New York Times to show just how disturbing labor conditions at Foxconn, the “Chinese hell factory,” really are.
February 7, 2012 |

Behind the sleek face of the iPad is an ugly backstory that has revealed once more the horrors of globalization. The buzz about Apple’s sordid business practices is courtesy of the New York Times series on the “iEconomy. In some ways it’s well reported but adds little new to what critics of the Taiwan-based Foxconn, the world’s largest electronics manufacturer, have been saying for years. The series’ biggest impact may be discomfiting Apple fanatics who as they read the articles realize that the iPad they are holding is assembled from child labor, toxic shop floors, involuntary overtime, suicidal working conditions, and preventable accidents that kill and maim workers.

It turns out the story is much worse. Researchers with the Hong Kong-based Students and Scholars Against Corporate Misbehavior (SACOM) say that legions of vocational and university students, some as young as 16, are forced to take months’-long “internships” in Foxconn’s mainland China factories assembling Apple products. The details of the internship program paint a far more disturbing picture than the Times does of how Foxconn, “the Chinese hell factory,” treats its workers, relying on public humiliation, military discipline, forced labor and physical abuse as management tools to hold down costs and extract maximum profits for Apple.

To supply enough employees for Foxconn, the 60th largest corporation globally, government officials are serving as lead recruiters at the cost of pushing teenage students into harsh work environments. The scale is astonishing with the Henan provincial government having announced in both 2010 and 2011 that it would send 100,000 vocational and university students to work at Foxconn, according to SACOM.

Ross Perlin, author of Intern Nation, told AlterNet that “Foxconn is conspiring with government officials and universities in China to run what may be the world’s single largest internship program – and one of the most exploitative. Students at vocational schools – including those whose studies have nothing to do with consumer electronics – are literally forced to move far from home to work for Foxconn, threatened that otherwise they won’t be allowed to graduate. Assembling our iPhones and Kindles for meager wages, they work under the same conditions, or worse, as other workers in the Foxconn sweatshops.”

The state involvement shows Foxconn and Apple depend on tax breaks, repression of labor, subsidies and Chinese government aid, including housing, infrastructure, transportation and recruitment, to fatten their corporate treasuries. As the students function as seasonal employees to meet increased demand for new product rollouts, Apple is directly dependent on forced labor.

The real story of the Apple-Foxconn behemoth, then, is far from being John Galt incarnate. Their global dominance is forged in the crucible of China’s state-managed authoritarian capitalism. Since the 1980s China has starved rural areas to accelerate the industrialization of coastal cities like Shenzhen, where Foxconn first set up shop in 1988. Scholars who study China’s economy and labor market link rural underdevelopment to the creation of a massive migrant work force that serves as the foundation of the country’s industrialization. Deprived of many rights, migrants are recruited to work in Foxconn’s city-sized complexes by government employees with false promises of good-paying jobs that will help them escape rural poverty. A large percentage of migrant workers are student interns as they are recruited from poor rural regions like Henan and sent to work in coastal metropolises like Shenzhen.

Read more here


Kractivism-Gonaimate Videos

Protest to Arrest

Faking Democracy- Free Irom Sharmila Now

Faking Democracy- Repression Anti- Nuke activists


Kamayaninumerouno – Youtube Channel


Enter your email address to follow this blog and receive notifications of new posts by email.

Join 6,225 other followers

Top Rated

Blog Stats

  • 1,860,298 hits


September 2022
%d bloggers like this: