Download Game Arachnos

Posted on Sunday, December 20, 2009 by khabibkhan

A good sidescrolling Space Shooter in retro style
Nice graphical effects and a lot of powerups. Each level ends with a big boss. I really enjoyed playing this game.
Best click first on "Config" in the main menu, so you can change the number of lives, difficulty settings and so on.

notes:
- On my computer the game starts with an unreadable error, but no problem, after clicking the Yes button the game runs fine.
- The fullscreen option doesn't seem to work.

Controls (redefinable):
Arrows = Move
Z = Fire
X = Powerup
Shift = Multiple key (?)
Space or Esc = Pause
DOWNLOAD

Read More..

Ebook How To Create Mobile Game

Posted on Monday, December 14, 2009 by khabibkhan

Creating Mobile Games: Using Java™ ME Platform to Put the Fun into Your Mobile Device and Cell Phone is a practical build-it-yourself mobile Java games book with lots of complete working code and advice:


Shows you how to create a basic game and make it a professional one (by adding a pro look-and-feel by writing your own menus or using the open source J2ME Polish, and enabling marketing/billing from your own web site)Demonstrates Wireless Messaging and other optional APIs (using SMS, PIM, File Connection, Bluetooth, and so forth in a multiplayer game)Covers the new MIDP3

What you’ll learn
Start using the MIDP2 and MIDP3 in the newly open sourced Java ME Games API.Add a truly professional look-and-feel to your Java ME games.Use threads, tones, and other media.Store and retrieve data and enable networking.Create advanced interactive messaging with optional APIs for multiplayer gaming.Explore a complete business model for independent developers (distributing their own games) as well as for larger companies.

Who is this book for?

Software engineers with some knowledge of Java who would like to switch to MicroEdition programming, particularly games.
DOWNLOAD HERE

Read More..

Adsense For Search

Posted on Tuesday, December 8, 2009 by khabibkhan

While talking about Google AdSense, we must not forget that Google is primarily known for its search engine capabilities (in fact, it is one of the most powerful search engines available today). So, how could Google leave out it search engine capabilities from its AdSense program?

"AdSense for Search" is how Google includes search engine bit into the Google AdSense program. ‘AdSense for Search’ can actually be termed as a sibling of Google AdSense program and is one great way of increasing website revenue for website owners. To implement ‘AdSense for search’, you just have to include the Google search box on your website. Again, Google offers the code that you need to use for including Google search box. You just have to paste the code at whatever place you deem as the most appropriate place for Google search box.

When your website visitors use Google search bar on your website, they get almost the same results as they would by using Google separately through Google.com. When these website visitors click the search results, the website owner earns revenue (CPC revenue). You can even include AdSense Ads on the search results page and earn CPM or CPC revenue from them. Also, you can customize the search results page to suit your website’s theme. So, Google AdSense for search is one great way of making money just by including the Google search bar on your website. Besides that, the visitors to your website get an additional functionality through your website i.e. the facility to search the web using one of the most powerful search engine (without leaving your website).

‘AdSense for search’ is a great way of earning revenue through your website (and, in fact, one of the easiest ways too). A number of website owner actually use both the ‘AdSense for Search’ and the regular ‘AdSense for content’ in order to maximize their revenue.

Read More..

What is Google AdSense?

Posted on Friday, December 4, 2009 by khabibkhan

AdSense is a wonderful advertising concept that was conceived by Google some time back. Though new advertising concepts keep coming up all the time, this one is something that is altogether different.


AdSense (Google’s advertising program) presents an earning opportunity to the website owners by allowing Google to post advertisements on their websites. These advertisements are either text advertisements or image based advertisements. Of course, the website owners need to enroll to the AdSense program through Google’s website (https://www.google.com/AdSense). Google AdSense program requires you (the website owner) to include a piece of code (a programming script) on your website. You can add this piece of code anywhere in the html code of your website i.e. depending on where you want to position the advertisements (however, there are certain rules that you must follow while pasting this scripting code). This piece of code is what determines the structure of advertisements and their content (and this is what helps Google in floating the advertisements on your website). When people visit your website they are able to see these advertisements. Your earnings are based on how many Google Ads are displayed on your website and also based on how many times visitors to your website actually click on one of those Ads. The Google AdSense system calculates your revenue on per-click (CPC) and per-thousand-Ads-displayed (CPM) basis. The latter is also known as impressions.

For people who want to advertise their products and services through the Google AdSense system, it’s just a matter of signing up through Google Adwords program and letting Google know how much they want to spend towards advertising through Google AdSense. These businesses can specify the limit and Google AdSense system will accordingly serve their Ads so as to ensure that the specified limit is not crossed. Google AdSense increases the visibility of their business/ services and also increases traffic to their website; hence fulfilling their purpose of advertising.

Read More..

How to Avoid Duplicate Content in Blogspot

Posted on Monday, November 23, 2009 by khabibkhan

Do You Know if Google is taking serious measure to rid it's search engine result pages from duplicated content. It is frustrating to see MFA pages when you are doing your search. These MFA pages used scripts to publish other's articles and blogs. These are duplicate content.
"Google, in doing so, also penalizes websites that have different URLs pointing to the same page."

Legitimate Blogs Are Penalized Too
For example, you started a new blog with Blogger.com. You made 3 posts, one everyday. Your main page http://yourblog.blogspot.com lists 3 posts, which is identical to the archive, http://yourblog.blogspot.com/2007_03_01_archive.html, showing the same 3 posts.
To the search engine, this is duplicate content. One of the URLs will be "supplementaled" or worse, delisted from the search engine database.

Blogger Archive Option
To prevent this from happening to your blog. Do you activate the Archive option when you first started the blog. Wait till you've written for more than 1 or 2 months.

The following screen shot shows you how to set Archive Frequency to No Archive

Read More..

Reset Canon BJC-3000 BJC-6000 BJC-6100 BJC-6200 S400 S450 F300 F600 F620, Canon BJC-7000 BJC-7100 BJC-8000 BJ-F800 i6500

Posted on Tuesday, November 17, 2009 by khabibkhan


  1. Power off printer
  2. Hold Resume button then press and hold POWER, the beeper will sound once.
  3. Hold POWER and release RESUME
  4. Press RESUME twice
  5. When the indicator lights steady, press RESUME three times. The indicator should be orange.
  6. Press Power to set data

Read More..

Free Download wallpaper blackberry Qwerty(Glass wallpaper)

Posted on Monday, November 16, 2009 by khabibkhan

This wallpaper (Glass wallpaper) is 230x240pixel which compatible with blackberry phone and of kind keypad qwerty handphone.


Pack contain 49 file wallpaper
Download Here

Read More..

Chronological List Of The Names Of Windows (Microsoft)

Posted on Monday, October 26, 2009 by khabibkhan

Now days, Newest windows is Microsoft windows 7, but did't you know, why called windows 7, this below is cronological, why called windows 7
First Windows version was Windows 1.0. Second was Windows 2.0 and third was Windows 3.0. When Windows NT was released, it was code versioned as Windows 3.1. Windows 95, 98, 98 SE and ME (Millennium Edition) were code versioned as Windows 4.0 as all were using Non-NT kernel or 9x kernel.
Windows 2000 was code versioned as Windows 5.0 and Windows XP as Windows 5.1. Next version was Windows Vista which was code versioned as Windows 6.0. Since Windows 7 is the next
Windows version, Microsoft decided to call it Windows 7 for easy and better understanding.
1.0: Windows 1.0
2.0: Windows 2.0
3.0: Windows 3.0
3.1: Windows NT
4.0: Windows 95, 98, 98SE, ME
5.0: Windows 2000
5.1: Windows XP
6.0: Windows Vista
7.0: Windows 7

Read More..

Free Download Space Wallpaper

Posted on Monday, October 5, 2009 by khabibkhan

Free Download Space Wallpaper Gratis 1280 x 1024 pixel



Download Space Wallpaper

Read More..

Top 10 Linux Games

Posted on Thursday, September 17, 2009 by khabibkhan

1. Battle For Wesnoth
David White who started Wesnoth back in 2003, had a vision of a free open source strategy game that had very simple rules, uses a strong artificial intelligence, challenging and fun. Wesnoth has already passed the 1 million mark for downloads. As of March 2007, the game is available in 35 different languages.
A normal Wesnoth player has 200+ unit types
16 different races
6 major factions
to choose from. Actually, you can even make your own custom units, design your own map, scenarios or even campaigns. It’s all up to your creativity. The most interesting part of any game is the ability to multiplay. You can challenge up to a total of 8 friends in multiplayer fantasy battles.

2. Nexuiz
Nexuiz is a free, cross platform, first person shooter distributed under GNU General Public License by Alientrap Software. It started back in May 31 2005 with version 1.0 using DarkPlaces, a significanlty modified quake engine. The current version, 2.2.3, was released on January 26, 2007. Nexuiz’s logo is based on the chinese character “力” which means strength.
Several notable features of the game include ability to multiplay up to 64 players
ability to generate bots for practice sessions dynamic lighting system similar to Doom 3

3. America’s Army
America’s Army is a tactical, multiplayer, first-person shooter owned by the United States Government and released as a global public relations initiative to help with U.S. Army recruitment. The first version, Recon, was released on 4th July 2002. The current version 2.8.1 was released on 22nd Mar 2007.
It’s the first well known computer game used for political aims. The game is used as a playable recruiting tool and critics have charged the game serves as a propaganda device. A counter on the homepage of the PC version shows over eight million registered accounts as of 2007. GameSpy tracked the game usage and reported an average of 4,500 players at any one time between 2002 and 2005. It is enough for America’s Army to rank in the Top 10 Online Games chart.

4. Enemy Territory : Quake Wars
is a first-person shooter follow-up to Wolfenstein: Enemy Territory. It also has the same science fiction universe as Quake 4, with a story serving as a prequel to Quake II. Quake Wars is the second multiplayer-only game in the Quake series after Quake III Arena. The gameplay is almost the same as Wolfenstein: Enemy Territory, but with the addition of controllable vehicles and aircraft, asymmetric teams, much larger maps and the option of computer-controlled bots. Enemy Territory: Quake Wars is being developed by Splash Damage for the PC using a modified version of id Software’s Doom 3 engine and MegaTexture rendering technology.
At E3 2006(Electronic Entertainment Expo), the game won the Game Critics Award for Best Online Multiplayer.

5.Tremulous
Tremulous is an open source team-based first-person shooter with a game play that is similar to Gloom(a quake 2 mod) and Natural Selection (a Half-Life mod). The game features two teams, humans and aliens, each with their own strengths and weaknesses. The game has been downloaded over 200,000 times and was voted “Player’s Choice Standalone Game of the Year” in Mod Database’s “Mod of the Year” 2006 competition.

6. Tux Racer
Tux Racer is a newbie friendly, open source, 3D computer game starring the Linux mascot, Tux the penguin. Like many open-source games, the replay value of Tux Racer is extended by easy modification of the game. New maps can be created by making three raster images to indicate height, surface, and object placement. The last release of Tux Racer was version 0.61, 29th October 2001.

7.World Of Padman
WOP is a new and free comic style game that uses the Quake 3 engine. The game was recently featured in 3 German magazine covers; PC Action, ‘BRAVO Screenfun’ and ‘Linux Intern’.

8.Vendetta
is a first person twitch based MMORPG. New players get an 8 hour trial which is enough to get anyone hooked to it. After that, you gotta pay $5 a month which is quite worthwhile, especially considering the incredibly communicative development of the game. It has a native linux installer as well as one for Macs and Windows.

9.Alien Arena 2007
Alien Arena is a completely free FPS started by COR Entertainment in 2004 comprising of a science fiction ambience and a Quake like gameplay. This game is playable in single player mode against bots, but the action and thrill lies at the online multiplayer mode. Features of the Alien Arena 2007 include an internal server browser for finding other people to play online and an external program that acts as an IRC interface. There are 6 game types and 6 game mutators that changes the gameplay. Cattle Prod is a new game type that requires you to herd robotic cattle to earn points. Alien Arena 2007 is playable in Windows, Linux and FreeBSD.

10.Urban Terror
A mod of Quake III Arena, Urban Terror focuses a lot on realism. Number of weapons and gear that can be carried is limited. Accuracy is reduced when fired while moving and magazines require reloading upon expension. Damage areas are identified throughout the body. Wounds require bandaging and slows down movement significantly if the damage is not bandaged. Even a stamina bar is present to indicate if the player is able to sprint or jump. Released on 1st April 2007, Urban Terror 4 introduced 4 new features namely, ‘powersliding’, new weapons, player models and improved hit detection. It also supports anti cheating tools like PunkBuster, BattleEye and RunDMC.

Read More..

10 Interesting Sleeping Facts

Posted on Saturday, September 12, 2009 by khabibkhan

There are many interesting facts about sleeping that you probably didn’t know. The study of sleep is actually pretty modern, in fact most of what we have learned about it has happened in the last 25 years. With this in mind, I have put together a list of the top 10 amazing facts about sleeping.

  1. The record for the longest period without sleep is over 18 days. This person experienced hallucinations, blurred vision, slurred speech and memory lapses.

  2. It is almost impossible to tell if someone is really awake without medical supervision. People can have naps with their eyes open and not even know it.

  3. Elephants lie down during REM sleep, but sleep standing up during non-REM sleep.

  4. What is commonly known as the the “natural alarm clock” which allows people to wake up when they want, is caused by the stress hormone adrenocorticotropin.


  5. The tiny rays of light from a digital alarm clock can actually be enough to disrupt your sleep cycle.

  6. On average humans sleep about three hours less than other primates.

  7. Ducks are able to balance the need for sleep and survival by keeping one half of the brain awake and other half in sleep mode.

  8. Most of what we know about sleep we’ve learned in the past 25 years.

  9. It has been suggested that the availability of the internet is one of the major influences of sleep distractions.

  10. Studies suggest that women need up to an hour’s extra sleep a night compared to men.

Read More..

How To Protect Your Computer From Hackers, Spyware and Viruses

Posted on Tuesday, September 8, 2009 by khabibkhan

This post has been inspired by the situation of one of my cousin’s computers in India. I recently made a trip there and since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” act was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet. First thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install AVG anti-virus and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus! To make a long story short (and I mean a LONG story), there were 2256 viruses on the computer and 110 instances of spyware. I have never even heard of such a ludicrous number of viruses on a computer before!


Most of the viruses on the computer were hidden in files that had been downloaded off the Internet: songs, videos, and movies. I was amazingly surprised that the computer lasted for 2 years with that many viruses! So I gave my dear cousin a serious lesson in how to protect her computer from the dangers of the Internet and I will go through them here for anyone else who might be interested!

This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and I’ll add them on!

1. Install Anti-Virus Software - This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages. Here are two of the most popular ones:

AVG Anti-Virus – Very good and completely free.

Avast Anti-Virus – Almost on par with AVG.

Kaspersky Anti-Virus – Not free, but one of the best detection rates.

2. Update All Software
- Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat the new threats. Make sure you anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it. Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.

3. Install only Trusted Software - If you’re not sure what a piece of software does from it’s name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the first application. Be careful of that because it’s usually spyware. Install software from big names sites only, such as Microsoft or Adobe.

4. Avoid P2P File Sharing Software – If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans.

5. Delete Unknown Emails
– If you receive emails from random people’s names, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc asking for you to verify bank account info or address info. No bank ever does that.

6. Do not click on Ads
- Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.

7. Run Virus Scans Regularly – If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.

8. Be careful what you attach to your computer – This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.

9. Avoid Shady Web Sites
– If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get some virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not effect your current operating system. If you want to find out more, search for “Virtual PC” or “VM Ware” in Google. Otherwise, simply avoid going to shady web sites!

10. Turn On or Install a Firewall
- If you’re running Windows XP, make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.

11. Secure Your Wireless Network
– Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router, otherwise anyone can connect to your home network and access everything.

12. Use a Complex Password for Login – This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.

Read More..

How to Get Search Engine Traffic to Your Blog?

Posted on Friday, September 4, 2009 by khabibkhan

This article describes a set of procedures, also known as search engine optimization (SEO), which helps web pages to obtain better positions in search engine’s search pages.

You might be wondering the reasons your web site is not getting much internet traffic. After all your web site took lots of financial and human resources, but unfortunately like so many web sites, it is quite unknown and as a result it does not get enough internet traffic to make it financially viable.

Did you know that about 80 percent of all web site traffic originates from search engines? Yes, it is true! Listing near the top page of search engines and obtaining the attention of your target audience should be a main priority for any web site internet promotion.

And the good news about this is that improving a web site position in search engine pages may be done for free. How? Using search engine optimization (SEO) techniques.

There are many ways to promote a web site. Some promotions are paid and some are free. Among the free ones, the search engine optimization techniques enable web sites to become search engine friendly. In other words, it makes website pages to accept the search engine crawler in a friendly way. These techniques will be some of the steps one will have to use to obtain a better position in search engine’s pages, when searching for specific keywords, related to services or products offered by a web site.

Search engine optimization steps for a web page:

Title:

The html Title tag is a very important element and must include the most important keywords or phrases, which best represent the products or services offered by the web page. It should not contain more than 60 characters.

Keywords:

The html meta Keyword tag should have all the keyword phrases which best represents the products or services offered by the web page. Avoid repeating keywords and bad use of capital letters. It should not contain more than 250 characters.

Description:
The html meta Description tag is a description of the web page, which will be displayed by the search engine. Make sure it contains keywords phrases. Avoid repeating keywords and bad use of capital letters. It should not contain more than 200 characters.

Keywords in Headings:

Keywords in Headings tags (h1) will be interpreted by search engines as being an important keyword relevant to the web page, and it should be looked for and indexed by the search engines.

Web page text:
It is a good practice to include informative text one every page, using natural language and appropriate keywords. It should contain more than 200 words. Informative text should be placed in the html Body section of the web page.

Keywords in Alt Tags:

Every html picture “img” tag should contain an ALT tag with an appropriate description. Keywords should always be used when appropriate.

Keywords in Anchor Tags:

Every html hypertext link “a href “ should contain a TITLE tag with an appropriate description. Keywords should always be used when appropriate.

Robots.txt file:

Make sure there is a robots.txt file in you web site directory. This is a text file created by the webmaster, which will guide the search engine´s crawler when indexing a web site.

There are some cases in which one might not want to have some web pages indexed. This way thru the use of robots.txt, one will have control over which pages will be indexed and made available to the search engines.

User-agent: *
Disallow: /tmp/
Disallow: /data/

HTML code validation:
Search engine’s crawlers become more efficient when indexing web pages with no html errors. Beware that some html errors can make search engine crawlers to give up indexing web pages. So it is recommended for those web pages to be indexed, there should be no html errors.

Links:
Links are very important to search engines. The quality of links and whether it is reciprocal or not, are important factors in evaluating the importance of a web page. Links from web sites with higher page ranks are a plus.

Registering with Directories and Search Engines:
It is very important the registration of a website with directories and search engine web sites. It is a way of telling the world that your web site exists. Avoid using automatic search engine/directory registration.

Search engine optimization has become a very important set of procedures which helps web sites to become more relevant to search engines. To obtain an increase in internet traffic will take some time. It probably will take some kind of additional promotion too. But anybody in need of higher internet traffic, free search engine optimization might be considered his first option.

This article is under GNU FDL license and can be distributed without any previous authorization from the author. However the author´s name and all the URL´s (links) mentioned in the article and biography must be kept.

Read More..

20 Super Food Your Need to Bild Muscle & Lose Fat

Posted on Tuesday, September 1, 2009 by khabibkhan

To build muscle & lose fat, you need a variety of proteins, veggies, fruits, carbs, and healthy fats. Eating protein helps building & maintaining muscle. But it also helps fat loss: protein has a higher thermic effect than carbs/fats.

Eating fats also helps fat loss: your body holds fat if you don’t eat fats. Fruits & veggies contain vitamins & minerals, necessary for recovery from your workouts. And carbs fuel your muscles so you feel full of energy at the gym.

Lots of you struggle to get these foods. Sometimes because you’re too busy or sometimes because you just lack information. This list will help you — 20 super foods you need to build muscle & lose fat.

1. Whole Eggs. Cheap & rich source of protein: 7g/egg. The yolk contains most nutrients: half the protein, vitamins A/D/E and cholesterol to naturally increase your testosterone levels.

Don’t worry about cholesterol in eggs. Dietary cholesterol isn’t bound to blood cholesterol. Read this, this, this & this. If you have bad cholesterol, lower your body fat rather than throwing the yolk away.

2. Fish Oil. Reduces inflammation (joints/skin), lowers body fat and increases testosterone levels. You need 9000mg EPA/DHA per day. Since you’ll probably struggle to get that from eating fatty fish, consider a fish oil supplement.

3. Wild Salmon. One of the best sources of omega-3 fatty acids that also gets you 20g protein per 100g serving. Farm raised salmon is, however, omega-3 deficient: it’s corn/grain fed. Go with wild salmon.

4. Berries
. Strong antioxidants that prevent cancer, heart & eye diseases. Any kind works: cranberries, raspberries, blackberries, blueberries, etc. Buy fresh or frozen berries and mix with oatmeal.

5. Yogurt. Contain bacteria that improve your gastrointestinal health. Don’t buy frozen yogurt or yogurt with added sugar and fruits at the bottom. Get plain low fat yogurt. Eat it with berries & flax seeds.

6. Flax Seeds. Source of fiber, protein & omega-3. Grind the flax seeds to get the most out of them. Take 1 tbsp with yogurt & berries before going to bed. Stay away from flax oil: it’s unstable and contains no fiber.

7. Extra Virgin Olive Oil
. 70% monounsaturated fats that protect against heart diseases and cancer. Add 1-2 tbsp olive oil to your salads. Buy Extra Virgin Olive Oil: it contains more polyphenols and tastes better.

8. Mixed Nuts
. Contain mono- & polyunsaturated fats, proteins, fiber, vitamin E, zinc, potassium, magnesium, etc. Mixed nuts are caloric dense, great if you’re a skinny guy who wants to gain weight.
Anything works: almonds, walnuts, cashews, hazelnuts, … Peanut butter also works as long as you buy natural peanut butter without added salts/sugars.

9. Red Meat. Protein, vitamin B12, heme iron, zinc, creatine, carnosine and even omega-3 if you eat grass-fed beef. Eat steaks & hamburgers from top round or sirloin. Read Dr. Lonnie Lowery’s article on Meat.

10. Broccoli. High in cancer-fighting phytochemicals and anti-estrogenic indoles. Broccoli is also high in soluble fiber and low calorie, helping fat loss. Eat other cruciferous vegetables for a change: cabbage, bok choy, cauliflower, kale, …

11. Spinach.
One of the most alkaline foods. Spinach prevents muscle & bone loss, but also cancer and heart diseases because of its high nutrient profile. Try one of the spinach recipes I shared a while back.

12. Turkey. If you don’t believe saturated fat is good for you, try white turkey. The leanest beef has about 4.5g saturated fat/100g, while white turkey has close to 0g (that why it’s so dry). Eat turkey with spinach & quinoa.

13. Quinoa. South American “king of grains”. Quinoa is higher in fiber & protein than rice or oats, tastes a lot better and is gluten free. Buy the whiter grain, it’s better quality. Eat it post workout with meat & spinach.

14. Oats. Reduce cholesterol, provide you with low-gi carbs for energy, and high in soluble fiber. Try this post workout shake of whey & oats.

15. Tomatoes. High in lycopene, which prevents cancer. The lycopene in tomato paste is 4 times more bioavailable than in fresh tomatoes. Have pizza or pasta with tomato sauce & olive oil post strength training.

16. Oranges. Vitamin C to fight diseases, magnesium to lower blood pressure, anti-oxidant beta-carotenes, etc. Quit drinking processed orange juice which often has added sugars. Eat oranges or make your own orange juice.

17. Apples.
Pectin in apples helps weight loss by increasing satiety. Apples are also the strongest antioxidiant after cranberries (eat the peels). Unfortunately apples are one of the most pesticide-contaminated fruits. Go organic.

18. Carrots. Their huge vitamin A content improves eye-health, especially night vision. Carrots are also rich in fiber, low calorie and taste good, even raw.

19. Water. Your body holds water if you don’t drink enough. Drinking prevents water retention, helps muscle recovery and prevents dehydration from strength training. Get a brita filter and drink 2 cups of water with each meal.

20. Green Tea. Strong antioxidant and natural diuretic. Green tea also speeds up fat loss, prevents cancer and improves blood sugar & circulation. Drink green tea in the morning instead of coffee. Real green tea, not the teabags.

Putting it All Together. Eat proteins, veggies, fruits & fats every 3 hours. 2 cups water with each meal. Carbs post workout only. Junk food 10% of the time. Get stronger in the meanwhile and you’ll build muscle & lose fat.

Source: http://stronglifts.com/

Read More..

Download Yahoo Messenger 10

Posted on Friday, August 28, 2009 by khabibkhan

Warm up your webcams because the all-new Yahoo! Messenger 10 Beta has arrived! This latest release is full of great new features. Without further ado, here’s what you’ll find inside:

High-quality video calls
We’ve completely redesigned our 1:1 webcam feature (under the hood too). Now you can make a high-quality video call to a friend with synched audio, right in the IM window. Features include the ability to swap video windows, position the video windows side-by-side, mute the call or place it on hold. You can even go full-screen with your video call. To get started, click the new “Video Call” button in the IM window.

Note that the friend you video call has to also be on Yahoo! Messenger 10. And these video enhancements are just for 1:1 video calls; broadcasting your webcam to multiple viewers (with no audio) has not changed.

New “Y! Updates” view of your contact list
We added an alternate view of your contact list that shows a real-time stream of their updates, including Messenger status message changes. If they’ve opted-in to share their updates via Yahoo!, you’ll be able to see what they’re saying on Twitter, reading on Yahoo! Buzz, listening to on last.fm, and more.

Change your language easily
If you use the U.S. version but wish it could be in your local language, you’re in luck. When you start up Yahoo! Messenger 10 Beta, you’ll notice a new language menu on the sign-in screen. Choose from 16 different languages and the buttons, menus and various parts of the interface will change to that language. If you’re already signed in, you can also change your language under Messenger > Preferences > Language (you’ll have to restart Yahoo! Messenger for it to take effect).

New icons in the IM window
We also added new icon designs to the toolbar in the IM window, and you’ll also find specific buttons for video calls and voice calls.
DOWNLOAD YAHOO MESSENGER
DOWNLOAD YAHOO MESSENGER(Offline Installer)

Read More..

Download Sound Windows 7 For XP

Posted on Wednesday, August 26, 2009 by khabibkhan

Windows 7 Soundpack For Windows XP
This pack contain 13 soundpack windows 7 seven:


1. Sonata soundpack
2. Savanna soundpack
3. Raga soundpack
4. Quirky soundpack
5. Landscape soundpack
6. Heritage soundpack
7. Garden soundpack
8. Festival soundpack
9. Delta soundpack
10. Cityscape soundpack
11. Characters soundpack
12. Caligraphy soundpack
13. Afternoon soundpack

Download Windows7 Sound for XP

Read More..

Tips Repair Memory, 90% working

Posted on Monday, August 24, 2009 by khabibkhan

This is tips how to repair memory not function

  1. Clean the memory by way of rubbing memory pins with the purpose of cleaning cloth, may also give a little thinners to clean the dust, and friction with the cloth will also be fishing the ions on the memory pins to stimulation more active conductor.

  2. Point Avometer the Ohm scale (scale to measure barriers), may be in the position of free 1K, 10K, 100K ...

  3. Take the needle negative (-) Avometer (black cable) and then stick to one pin / leg memory, and the needle positive (red wire) friction on the set of legs IC / chipset memory, if memory IC has 8 pieces such as the friction needle (+) into the legs of these ICs 8.

  4. Done .... Please try to install it on the memory slot on the Mainboard ....!

Read More..

Problem solve if sound start windows and shutdown windows not hearing

Posted on Saturday, August 22, 2009 by khabibkhan

How To Problem solve if sound start windows and shutdown windows not hearing

  1. Make sure the sound driver is installed with good

  2. Click start--> Run--> Type mmsys.cpl and the tab sound choose windows default then browse sound that you want to be sound windows

  3. If still problem-->Click start-->Run-->Type services.msc and look and make sure the windows audio started automatic

  4. If still Problem-->Click Start-->Run-->Type Regedit-->HKEY_CURRENT_USER\Control_Panel\Sound-->look for beep and make sure value data is YES


Read More..

Reset Printer Canon BJC-50 BJC-55 BJC-80 BJC-85 M40 M70

Posted on Thursday, August 20, 2009 by khabibkhan

How to rest Printer Canon BJC-50...This Below is Step by Step to Reset Printer Canon BJC

1: Unplug Power Cord
2: Hold POWER and RESUME buttons
3: Plug in Power Cord

4: Release buttons after the printers starts up
5: Hold CARTRIDGE and RESUME
6: Press POWER
7: Release all buttons after the beep
8: Press CARTRIDGE 16 times
9: Press RESUME
10: Unplug the Power cord

Read More..

Free Download Fruit Wallpaper

Posted on Monday, August 17, 2009 by khabibkhan

Free Download Fruit Wallpaper 1024 x 768 pixel


Download Wallpaper

Read More..

Free Download Flash Game Super Mario Bross

Posted on Saturday, August 15, 2009 by khabibkhan

This is Classic Game Super Mario Bross, Try it and enjoy fun !


Download Super Mario Game

Read More..

Free Download Vista Wallpaper

Posted on Thursday, August 13, 2009 by khabibkhan


Free Download Aurora Wallpaper


Download Vista Aurora Wallpaper

Read More..

Free Download Flash Game Tic Tac Toe

Posted on Tuesday, August 11, 2009 by khabibkhan

This is simple strategy game, can be play 2 player. Try It!!


Download Game

Read More..

Create Read More Blogspot / Blogger

Posted on Monday, August 10, 2009 by khabibkhan

This tips is How to create readmore in blogspot, if you want to create readmore on wordpress see here :

  • login into your blogger account www.blogger.com

  • Click Layout-->Click Edit Html

  • Give Check arrow on  Expand widget template

  • find text code </b:skin> then copy the following text
    underneath

  • <style>

    <b:if cond='data:blog.pageType == &quot;item&quot;'>

    span.fullpost {display:inline;}

    <b:else/>

    span.fullpost {display:none;}

    </b:if>

    </style>


    Before added code and After added code




  • Find Text Code <p><data:post.body/></p>, then copy this
    code underneath



  • <b:if cond='data:blog.pageType != &quot;item&quot;'>

    <a expr:href='data:post.url'> Read More..</a>

    </b:if>






  • Start to Post-->Add this code under your short article that you want to post

  • <span class="fullpost">


    and posting you full article under code <span class="fullpost">
    and close finished article with code </span>


    look image this below for more



Read More..

Monalisa

Posted on Saturday, August 8, 2009 by khabibkhan

mysterious smile that monalisa in work famous photo painting leonardo da vinci final revealed. german academicians has felted sure they success have broken mysterious that go on several centuries at the opposite of cutie identity that be that famous painting object.

lisa gherardini, wife a rich entrepreneur florence, francesco del giocondo, long looked at as model likeliest for century painting 16. but such, art historians often ask around to what may be woman that smile that actually darling da vinci, the mother or itself artist.

now expert at university library heidelberg declare based on note that written the owner in a book in october 1503 got certainty permanently that lisa del giocondo- model truthfully in that painting, be one of [the] famous photo painting at world.

” all hesitations about identity monalisa extinct follow invention by dr. armin schlechter, ” a expert codex, that library word is in the statement monday (14/1).

up to now, only got ‘proof less convince’ from various century document 16. ” this matter creats space for various interpretation and there many identities differ proposed, ” that library word.

that note is made by agostino vespucci, a official florence and friend da vinci, in article mail collection orator roman, cicero.

article in that note compares leonardo with ancient greek artist apelles and is declaring him is working on three paintings, one of them photo lisa del giocondo.

expert art, hook year that painting maker in that middle ages age, declare invention heidelberg that be penetration and previous reeling connects that large-scale merchant wife with photo painting.

” bothing;there is no reason to then doubt that this photo other woman, ” word historyman university art leipzig, franc zoelner, to german radio

Read More..

Download Theme XP

Posted on Thursday, August 6, 2009 by khabibkhan

Free Download Visual Style For XP Theme (Apple Edition)



DOWNLOAD HERE


Read More..

Create Blog on Blogger or Blogspot

Posted on Tuesday, August 4, 2009 by khabibkhan

This Below is Step by step Create a Blog with Blogger or Blogspot, but if you want to create a blog with Wordpress see here,

  1. Visit www.blogger.com

  2. Click "Create Your Blog Now"













  3. Types your email address and your password. In box Display Name, type your name that you want to appear in your blog. Must not real name




















  4. In box word verification. type the letters that shown in the top right, and do not forget to mark the I accept the Terms of Service after you read it. And then Click Continue.

  5. Choose blog name for your blog and type in Blog Tittle












  6. In Blogger.com, the name of your blog will end with blogspot.com. Choose a name that you like and enter the blog address (URL).
    Your blog address will be: Name_that_you_type.blogspot.com
    You can also click on Check Availability to make sure the name you want is still available. If not, please choose another name.When you are finished, click Continue.

  7. Choose Template That You Like.

















  8. Don’t worry if you are not yet sure of your choice. You can changes your template at a later. when Finished Click Continue

  9. Congratulations! Your blog is ready to use!









  10. Start to fill your blog with click Start Posting. Then see the results by clicking View Blog.
    Do not be afraid, You can always remove your posting at any time and replace it with a new one.

Read More..

Diagram Port USB (USB Pinout)

Posted on Saturday, August 1, 2009 by khabibkhan

USB (Universal Serial Bus) designed to connect peripherals such as mice, keyboards, scanners, digital cameras, printers, hard disks, and networking components to PC. It has become the standard connection method for scanners, digital cameras and for some printers. Complete pinout.


The Universal Serial Bus is host controlled and there can be only one host per bus. An USB system consists of a host controller and multiple devices connected in a tree-like fashion using special hub devices. Hubs may be cascaded, up to 5 levels. Up to 127 devices may be connected to a single host controller. USB interface aimed to remove the need for adding expansion cards into the computer's PCI or PCI-E bus, and improve plug-and-play capabilities by allowing devices to be hot swapped or added to the system without rebooting the computer. When the new device first plugs in, the host enumerates it and loads the device driver necessary to run it. The loading of the appropriate driver is done using a PID/VID (Product ID/Vendor ID) combination supplied by attached hardware. The USB host controllers has their own specifications: UHCI (Universal Host Controller Interface) and OHCI (Open Host Controller Interface) are used with USB 1.1, EHCI (Enhanced Host Controller Interface) is used with USB 2.0

USB pinout signals
USB is a serial bus. It uses 4 shielded wires: two for power (+5v & GND) and two for differential data signals (labelled as D+ and D- in pinout). NRZI (Non Return to Zero Invert) encoding scheme used to send data with a sync field to synchronise the host and receiver clocks. In USB data cable Data+ and Data- signals are transmitted on a twisted pair. No termination needed. Half-duplex differential signaling helps to combat the effects of electromagnetic noise on longer lines. Contrary to popular belief, D+ and D- operate together; they are not separate simplex connections.

USB transfer modes
Univeral serial bus supports Control, Interrupt, Bulk and Isochronous transfer modes.
USB transfer rates: Low Speed, Full Speed, Hi-speed.

USB supports three data rates: Low Speed (1.5 Mbit per second) that is mostly used for Human Input Devices (HID) such as keyboards, mice, joysticks and often the buttons on higher speed devices such as printers or scanners; Full Speed (12 Mbit per second) which is widely supported by USB hubs, assumes that devices divide the USB bandwidth between them in a first-come first-serve basis - it's easy to run out of bandwidth with several devices; Hi-Speed (480 Mbit per second) was added in USB 2.0 specification. Not all USB 2.0 devices are Hi-Speed. A USB device must indicate its speed by pulling either the D+ or D- line high to 3.3 volts. These pull up resistors at the device end will also be used by the host or hub to detect the presence of a device connected to its port. Without a pull up resistor, USB assumes there is nothing connected to the bus. A new USB 3.0 standard which will not be released for some time, supports an extended speed of 4.8Gbit per second.
In order to help user to identify maximum speed of device, a USB device often specify its speed on its cover with one of USB special marketing logos.
USB Hi-speed devices

Hi-Speed devices should fall back to the slower data rate of Full Speed when plugged into a Full Speed hub. Hi-Speed hubs have a special function called the Transaction Translator that segregates Full Speed and Low Speed bus traffic from Hi-Speed traffic.

USB powered devices
The USB connector provides a single 5 volt wire from which connected USB devices may power themselves. A given segment of the bus is specified to deliver up to 500 mA. This is often enough to power several devices, although this budget must be shared among all devices downstream of an unpowered hub. A bus-powered device may use as much of that power as allowed by the port it is plugged into. Bus-powered hubs can continue to distribute the bus provided power to connected devices but the USB specification only allows for a single level of bus-powered devices from a bus-powered hub. This disallows connection of a bus-powered hub to another bus-powered hub. Many hubs include external power supplies which will power devices connected through them without taking power from the bus. Devices that need more than 500 mA or higher than 5 volts must provide their own power. When USB devices (including hubs) are first connected they are interrogated by the host controller, which enquires of each their maximum power requirements. However, seems that any load connected to USB port may be treated by operating system as device. The host operating system typically keeps track of the power requirements of the USB network and may warn the computer's operator when a given segment requires more power than is available and may shut down devices in order to keep power consumption within the available resource.

USB power usage:
Bus-powered hubs: Draw Max 100 mA at power up and 500 mA normally.
Self-powered hubs: Draw Max 100 mA, must supply 500 mA to each port.
Low power, bus-powered functions: Draw Max 100 mA.
High power, bus-powered functions: Self-powered hubs: Draw Max 100 mA, must supply 500 mA to each port.
Self-powered functions: Draw Max 100 mA.
Suspended device: Max 0.5 mA
USB voltage:

Supplied voltage by a host or a powered hub ports is between 4.75 V and 5.25 V. Maximum voltage drop for bus-powered hubs is 0.35 V from its host or hub to the hubs output port. All hubs and functions must be able to send configuration data at 4.4 V, but only low-power functions need to be working at this voltage. Normal operational voltage for functions is minimum 4.75 V.
USB cable shielding:

Shield should only be connected to Ground at the host. No device should connect Shield to Ground.
USB cable wires:

Shielded:
Data: 28 AWG twisted
Power: 28 AWG - 20 AWG non-twisted

Non-shielded:
Data: 28 AWG non-twisted
Power: 28 AWG - 20 AWG non-twisted

Read More..

TransUnion

Posted on Friday, July 31, 2009 by khabibkhan

TransUnion (Trans Union, LLC) is the third largest consumer credit reporting agency in the United States, which offers credit-related information to potential creditors. Like major competitors Equifax and Experian; TransUnion markets credit reports directly to consumers.

History
TransUnion was created in 1968 by Union Tank Car Company as their holding company. Its credit business began with the purchase of Credit Bureau of Cook County (CBCC) in 1969. Trans Union was built from acquisitions of major city credit bureaus, with service agreements with local owners of bureaus which were not for sale. Today it operates 250 offices in the U.S. and in 24 other countries. It is based in Chicago, Illinois.
TransUnion was a subsidiary of The Marmon Group until January 2005 and is now an independent, privately held company.

Controversy
In 2003, Judy Thomas of Klamath Falls, Oregon, was awarded $5.3 million in a dispute with TransUnion. The award was later reduced to $1 million. Thomas claimed it took her six years to get TransUnion to remove erroneous information from her credit report.
In 2006, after spending two years trying to correct erroneous credit information due to identity theft, a fraud victim named Sloan filed suit against all three of the largest credit agencies. TransUnion and Experian settled out of court for an undisclosed amount. In Sloan v. Equifax, a jury awarded Sloan $351,000. "She wrote letters. She called them. They saw the problem. They just didn't fix it," said attorney A. Hugo Blankingship III of Blankingship & Associates in Alexandria, Virginia.

Read More..

Tips How To The Care Laptop Battery Doesn't Explode

Posted on Monday, July 27, 2009 by khabibkhan

Insident laptop explode often happen, to prevent battery laptop doesn't explode and evoke loss, matters that must you look at as follows:

  1. If battery weak and if battery weak and the operation time decreases drastic, better you are direct buys new battery. don't tries to repair battery that broken to use again.

  2. Always sure, you using original battery from official seller, if original battery a lot explode, even less with imitation battery.

  3. Don’t recharge your battery more than 8 clock, recharge battery too long risk evoke explosion.

  4. If battery is full when recharge, choose just one, using electricity or battery when you want to using laptop.

  5. Use recharge that compatible with your battery, charger that not compatible will increase risk overheating.

  6. Don not place the laptop in very hot area, for example in car baggage or under blazing sun.

  7. Always follow the development news technology, for example in the site news online, usually if there are problem with laptop batteries, vendor laptop will do withdrawal a large scale. If f your laptop happens problematic, you can follow the procedures that have been determined. for example, exchange the battery.

Read More..

Free Download Matherboard Driver

Posted on Saturday, July 25, 2009 by khabibkhan

If Your Driver Matherboard has Lose and look for motherboard driver that compatible with brand PC or your laptop, in here, I will give you information about site that provide free Driver Matherboard.

1. ASUS (www.asus.com)
Download Driver :
http://support.asus.com/download/download.aspx?SLanguage=en-us


2. Gigabyte (www.gigabyte.com.tw)
Download Driver :
http://www.gigabyte.com.tw/Support/Default.aspx

3. Intel (www.intel.com)
Download Driver :
http://downloadcenter.intel.com/

4. MSI (www.msi.com)
Download Driver :
http://www.msi.com/index.php?func=downloadindex

5. PCChips (www.pcchips.com.tw)
Download Driver :
http://www.pcchips.com.tw/PCCWebSite/Downloads/Category_Download.aspx?MenuID=6&LanID=2

6. BIOSTAR (www.biostar.com.tw)
Download Driver :
http://www.biostar.com.tw/app/en-us/support/download.php

7. ASRock (www.asrock.com)
Download Driver :
http://www.asrock.com/support/download.asp

8. AOpen (www.aopen.com)
Download Driver :
http://global.aopen.com/download.aspx

9. ECS (www.ecs.com.tw)
Download Driver :
http://www.ecs.com.tw/ECSWebSite/Downloads/Category_Download.aspx?MenuID=6&LanID=0

10. Jetway (www.jetway.com.tw)
Download Driver :
http://www.jetway.com.tw/jw/download.asp

11. IWill (www.flextronics.com/)
Download Driver :
http://www.flextronics.com/iwill/product_adns.asp

12. ABIT (www.abit.com.tw)
Download Driver :
http://www.abit.com.tw/page/en/download/download_driver.php

13. Chaintech (www.chaintech.com.tw)
Download Driver :
http://www.chaintech.com.tw/a40_downloads.php

14. EPoX (www.epox.com)
Download Driver :
http://www.epox.com/downloads.asp?class=DRIVERS

15. FoxConn (www.foxconnchannel.com)
Download Driver :
http://www.foxconnchannel.com/support/downloads.aspx

Read More..

Reset Printer Canon S9000, S300, S400, i550, i560, i850, i860, i865, i9100, i9950,

Posted on Thursday, July 23, 2009 by khabibkhan

PIXMA IP3000 Above




1. Turn off printer
2. Hold down Resume button and press Power button.
3. Keep holding down Power button and let Resume button go.
4. Press Resume button 2 times then let BOTH buttons go.
5. Green lights will flash and then stop blinking.
6. When green lights are solid, press the Resume button 4 times.
7. Press the Power button and the printer should turn off, if not, press the Power button once more.
8. Your printer should respond as normal.

Read More..

About Mesothelioma

Posted on Friday, July 17, 2009 by khabibkhan

1. What is the mesothelium?
The mesothelium is a membrane that covers and protects most of the internal organs of the body. It is composed of two layers of cells: One layer immediately surrounds the organ; the other forms a sac around it. The mesothelium produces a lubricating fluid that is released between these layers, allowing moving organs (such as the beating heart and the expanding and contracting lungs) to glide easily against adjacent structures.
The mesothelium has different names, depending on its location in the body. The peritoneum is the mesothelial tissue that covers most of the organs in the abdominal cavity. The pleura is the membrane that surrounds the lungs and lines the wall of the chest cavity. The pericardium covers and protects the heart. The mesothelial tissue surrounding the male internal reproductive organs is called the tunica vaginalis testis. The tunica serosa uteri covers the internal reproductive organs in women.

2. What is mesothelioma?

Mesothelioma (cancer of the mesothelium) is a disease in which cells of the mesothelium become abnormal and divide without control or order. They can invade and damage nearby tissues and organs. Cancer cells can also metastasize (spread) from their original site to other parts of the body. Most cases of mesothelioma begin in the pleura or peritoneum.

3. How common is mesothelioma?
Although reported incidence rates have increased in the past 20 years, mesothelioma is still a relatively rare cancer. About 2,000 new cases of mesothelioma are diagnosed in the United States each year. Mesothelioma occurs more often in men than in women and risk increases with age, but this disease can appear in either men or women at any age.

4. What are the risk factors for mesothelioma?
Working with asbestos is the major risk factor for mesothelioma. A history of asbestos exposure at work is reported in about 70 percent to 80 percent of all cases. However, mesothelioma has been reported in some individuals without any known exposure to asbestos.
Asbestos is the name of a group of minerals that occur naturally as masses of strong, flexible fibers that can be separated into thin threads and woven. Asbestos has been widely used in many industrial products, including cement, brake linings, roof shingles, flooring products, textiles, and insulation. If tiny asbestos particles float in the air, especially during the manufacturing process, they may be inhaled or swallowed, and can cause serious health problems. In addition to mesothelioma, exposure to asbestos increases the risk of lung cancer, asbestosis (a noncancerous, chronic lung ailment), and other cancers, such as those of the larynx and kidney.
Smoking does not appear to increase the risk of mesothelioma. However, the combination of smoking and asbestos exposure significantly increases a person's risk of developing cancer of the air passageways in the lung.

5. Who is at increased risk for developing mesothelioma?
Asbestos has been mined and used commercially since the late 1800s. Its use greatly increased during World War II. Since the early 1940s, millions of American workers have been exposed to asbestos dust. Initially, the risks associated with asbestos exposure were not known. However, an increased risk of developing mesothelioma was later found among shipyard workers, people who work in asbestos mines and mills, producers of asbestos products, workers in the heating and construction industries, and other tradespeople. Today, the U.S. Occupational Safety and Health Administration (OSHA) sets limits for acceptable levels of asbestos exposure in the workplace. People who work with asbestos wear personal protective equipment to lower their risk of exposure.

The risk of asbestos-related disease increases with heavier exposure to asbestos and longer exposure time. However, some individuals with only brief exposures have developed mesothelioma. On the other hand, not all workers who are heavily exposed develop asbestos-related diseases.
There is some evidence that family members and others living with asbestos workers have an increased risk of developing mesothelioma, and possibly other asbestos-related diseases. This risk may be the result of exposure to asbestos dust brought home on the clothing and hair of asbestos workers. To reduce the chance of exposing family members to asbestos fibers, asbestos workers are usually required to shower and change their clothing before leaving the workplace.

6. What are the symptoms of mesothelioma?
Symptoms of mesothelioma may not appear until 30 to 50 years after exposure to asbestos. Shortness of breath and pain in the chest due to an accumulation of fluid in the pleura are often symptoms of pleural mesothelioma. Symptoms of peritoneal mesothelioma include weight loss and abdominal pain and swelling due to a buildup of fluid in the abdomen. Other symptoms of peritoneal mesothelioma may include bowel obstruction, blood clotting abnormalities, anemia, and fever. If the cancer has spread beyond the mesothelium to other parts of the body, symptoms may include pain, trouble swallowing, or swelling of the neck or face.
These symptoms may be caused by mesothelioma or by other, less serious conditions. It is important to see a doctor about any of these symptoms. Only a doctor can make a diagnosis.

7. How is mesothelioma diagnosed?

Diagnosing mesothelioma is often difficult, because the symptoms are similar to those of a number of other conditions. Diagnosis begins with a review of the patient's medical history, including any history of asbestos exposure. A complete physical examination may be performed, including x-rays of the chest or abdomen and lung function tests. A CT (or CAT) scan or an MRI may also be useful. A CT scan is a series of detailed pictures of areas inside the body created by a computer linked to an x-ray machine. In an MRI, a powerful magnet linked to a computer is used to make detailed pictures of areas inside the body. These pictures are viewed on a monitor and can also be printed.

A biopsy is needed to confirm a diagnosis of mesothelioma. In a biopsy, a surgeon or a medical oncologist (a doctor who specializes in diagnosing and treating cancer) removes a sample of tissue for examination under a microscope by a pathologist. A biopsy may be done in different ways, depending on where the abnormal area is located. If the cancer is in the chest, the doctor may perform a thoracoscopy. In this procedure, the doctor makes a small cut through the chest wall and puts a thin, lighted tube called a thoracoscope into the chest between two ribs. Thoracoscopy allows the doctor to look inside the chest and obtain tissue samples. If the cancer is in the abdomen, the doctor may perform a peritoneoscopy. To obtain tissue for examination, the doctor makes a small opening in the abdomen and inserts a special instrument called a peritoneoscope into the abdominal cavity. If these procedures do not yield enough tissue, more extensive diagnostic surgery may be necessary.
If the diagnosis is mesothelioma, the doctor will want to learn the stage (or extent) of the disease. Staging involves more tests in a careful attempt to find out whether the cancer has spread and, if so, to which parts of the body. Knowing the stage of the disease helps the doctor plan treatment.
Mesothelioma is described as localized if the cancer is found only on the membrane surface where it originated. It is classified as advanced if it has spread beyond the original membrane surface to other parts of the body, such as the lymph nodes, lungs, chest wall, or abdominal organs.

8. How is mesothelioma treated?

Treatment for mesothelioma depends on the location of the cancer, the stage of the disease, and the patient's age and general health. Standard treatment options include surgery, radiation therapy, and chemotherapy. Sometimes, these treatments are combined.
• Surgery is a common treatment for mesothelioma. The doctor may remove part of the lining of the chest or abdomen and some of the tissue around it. For cancer of the pleura (pleural mesothelioma), a lung may be removed in an operation called a pneumonectomy. Sometimes part of the diaphragm, the muscle below the lungs that helps with breathing, is also removed.
• Radiation therapy, also called radiotherapy, involves the use of high-energy rays to kill cancer cells and shrink tumors. Radiation therapy affects the cancer cells only in the treated area. The radiation may come from a machine (external radiation) or from putting materials that produce radiation through thin plastic tubes into the area where the cancer cells are found (internal radiation therapy).
• Chemotherapy is the use of anticancer drugs to kill cancer cells throughout the body. Most drugs used to treat mesothelioma are given by injection into a vein (intravenous, or IV). Doctors are also studying the effectiveness of putting chemotherapy directly into the chest or abdomen (intracavitary chemotherapy).
To relieve symptoms and control pain, the doctor may use a needle or a thin tube to drain fluid that has built up in the chest or abdomen. The procedure for removing fluid from the chest is called thoracentesis. Removal of fluid from the abdomen is called paracentesis. Drugs may be given through a tube in the chest to prevent more fluid from accumulating. Radiation therapy and surgery may also be helpful in relieving symptoms.

9. Are new treatments for mesothelioma being studied?
Yes. Because mesothelioma is very hard to control, the National Cancer Institute (NCI) is sponsoring clinical trials (research studies with people) that are designed to find new treatments and better ways to use current treatments. Before any new treatment can be recommended for general use, doctors conduct clinical trials to find out whether the treatment is safe for patients and effective against the disease. Participation in clinical trials is an important treatment option for many patients with mesothelioma.

People interested in taking part in a clinical trial should talk with their doctor. Information about clinical trials is available from the Cancer Information Service (CIS) (see below) at 1–800–4–CANCER. Information specialists at the CIS use PDQ®, NCI's cancer information database, to identify and provide detailed information about specific ongoing clinical trials. Patients also have the option of searching for clinical trials on their own. The clinical trials page on the NCI's Cancer.gov Web site, located at http://www.cancer.gov/clinicaltrials on the Internet, provides general information about clinical trials and links to PDQ

Read More..