Personality Transformation

Monday, January 21, 2008

How to transform one's own personality (Especially from negative to positive)

For any transformation to be successful, it has to be deep and dramatic. Such deep process can bring about difference or newness in things. For example, to be able to access water from earth it is important to go deeper because the more shallow it is the more rocks and hurdles are experienced or seen.
Transformations are of 3 levels: Behavioral, Emotions, Attitudinal:
Its important to move from old to new. Change is inevitable and thus it should be welcomed with grace. Change is always possible when there is a necessary transformation of personality. That includes the process of thoughts attitudes relationships thoughts feelings and the entire life. An entire change such as this brings about a strong future, full of control and love.

Information fixation;
Lack of familiarity:
Belief in what we see:
Immediate result orientation:
Keeping the focus of the environment:
Lacking intrinsic motivation:
Over emphasis on weaknesses and undermining strengths:
Guiding voice for change
There are three voices or inspiration for transformation. One time or the other we are touched by one of them and most times realize the importance of transformation. They are Self induced voice, Voice of the world and Inner voice.
In order to bring transformation within the self we need to know the intricacies of our own personality and layers within. And transformation always start within that is - Transformation in self. And from here, we can move on to Transformation in Relationships, situations, work etc.
For all these, we should be a learner. Learning depends upon four factors:

Retrospection
Rectification
Realization
Reference.

We also need to go in to the depth of other aspects of our Personality-The person will be preoccupied about people. High sensitivity and feelings of insecurity. Giving importance to trivial responses from others. stubborn in interaction and high expectations from others:
Thoughts- mostly questioning about others behavior and their weaknesses and ones own behavior towards others
Attitude - non acceptance of others in any other way then their own.
Words- spoken sometimes harshly and with disrespect towards others In the area of work is that of having clarity and focused at work.
When we have understood the different areas of transformation we need to have clarity about the areas in which we need to transform in the present position. There are four areas as already discussed:

Self
Situation
Relationship
Work
And once we start our transformation process, we need to monitor the positive growth in all 4 areas of life. In work we need happiness and in situations we need power and in relations, love and in self peace.

Virtue Scope

Virtues are the natural power of good within each of us and they are our reality. The VirtueScope is a way for you to get in touch with your true virtues. It offers a map to develop these positive energies during the coming year. It is about re-establishing the very best in yourself so you can improve the quality of your life and the quality of your relationships.
Each day in your meditation or self reflection, simply bring the virtue for that month month into your awarness.

his online VirtueScope is a simple and fun way to explore your virtues. You can enter your name, pick a month, and the VirtueScope engine will build a calendar of virtues for you to focus on and bring you guidance throughout the year.
In your VirtueScope, six VirtueReality cards hold key positions. They are significant during the whole year and particularly in the month for which they are selected. These cards are marked with special symbols that remind you to focus on a particular aspect of the virtue and how it applies to your life.

Gmail

Gmail.com is a free email service notably different than any other. The main differences are: storage amount, ability to search, clustered conversations, and ability to label.

1. STORAGE AMOUNT - For all intents and purposes, you have unlimited storage with gmail. At the moment I have over 2694 megabytes of free storage, and that amount increases with every passing second. The reason for this large amount of storage is to make it so that you never need to delete an email message ever again. This brings me to point number 2.

2. ABILITY TO search - When I first learned that with Gmail you never need to delete a message, I was not particularly impressed. I receive many emails that provide me with quick information, but then serve only to clutter my inbox. Gmail, however, allows you to "archive" your messages if you choose to after you read them. This, for practical purposes, makes your message disapear (although you retain the ability to see all your old archived messages if you choose). Once a message has been archived, you can use the gmail search engine (just like the google search engine) to search all your old mail by keyword. Thus, if I want to recall an old email that had a subject heading or date I cannot remember, I can simply search by keyword and easily find that old email.

3. CLUSTERED CONVERSATIONS - Anytime someone hits "reply" to an email with a given subject line, that new email gets grouped along with all other emails of that same subject. The appearance of this is similar to a message board on a website. It allows you to either see the whole conversation, or just the newest messages. This feature makes it easy to keep track of the context of your emails, and to review the content of past emails.

4. ABILITY TO LABEL - Another convenient feature for organizing your emails is the ability to apply "labels" to emails. This feature is similar to folders with other email services, but its presentation is clearer and more convenient than typical folders.

In addition to the four features above, gmail has recently added gmail chat. With gmail chat you are automatically signed on whenever you sign into your gmail account, and you can instantly chat with other gmail users. I have not really used this feature yet.

http://www.gmail.com

Turbulence

When I grew up, I thought that I lived in the perfect family.
My mom and my dad got a divorce when I was four years old. I have two older sisters and my mom filed to have sole custody of us kids. My mom and my dad had a house together but she accepted a small sum of money in order to have us kids instead of claiming half of the house. She moved in, in a three room apartment with us kids and took on two jobs in order to be able to support us. Our dad lived 3 minutes from us but we hardly ever saw him .Usually he came down to visit us for a little bit on Christmas and sometimes he had us for the weekend. When he did have us for the weekend, he always had plans for himself though .Usually that meant him going out dancing and that meant that we had to manage on our own. I always felt grateful towards my mom though because the struggled for us kids and yet she always found time to be with us. At the same time she had high blood pressure and stomach problems so she went in and out of hospital. It always hurt me, being so young and seeing my mom being carried away on a stretcher into an ambulance. I grew a deep respect for my mom during this time and I still have that respect for her today, if not even more. Experiencing all of this made me a humble person and compassionate for other people with problems. A couple of years ago my mom suffered a hemmoridge and she was in the hospital for 6 weeks. They told us the same day she went in that she would not probably be fine ever again. That made me angry. I never gave up on my mom. Even though the hospital was about 35 min away, I went there every single day of the week. Also every single day of the week, I brought a gift for her. Every single day for six weeks. My mom loves presents and every single day, she looked at me and I said, mom I have a present for you. Each day I massaged her legs so she would not cramp up. I knew that it was the nurse’s job but they never had times with it and I never minded doing that for my mom. I also told my mom how important it was for me that she never gave up hope. If she did that she would never get well again. One day I baked cinnamon rolls for the entire floor of that unit at the hospital that she was in.350 cinnamon rolls to be exact. To brighten everyone’s day. To make a long story short, my mom never gave up. She now lives almost 100% normal life in her own apartment. Everything about her is intact and it is like it never happened. I tried to give back for all that she had given us when we all grew up. Maybe that is why she is doing well today. I love my mom.

Show the world your writing talents

I know you are a genius who are gifted with the ability to write great stories, non fiction articles or how-to tutorials. But the most important things you need are chances to let your articles exposed to as many readers as possible. Then you will get opportunities to realize yourself the dream of becoming a professional writer. How ? The answer is simple, just join some blogsites and write. There are many sites on the Internet provide spaces for your articles to post on and let your master pieces be read.Here I list two websites for your consideration. One is Writingup.com. The other one is Bloggersparty.com. Try these links to have a look at the website http://www.writingup.com?referer=3089 http://bloggerparty.com/referral/626c7136 Joining the blog is absolutely free and it is very easy to customize your writing page. You don't even have to know anything about HTML tags. You only need to type meaningful text on the blog spaces provided and hit submit after you have finished your written work, then you will be able to present a decent looking page to your audiance. Furthermore, the admin persons of the blogsites have put helpful hints on a particular page for you reference. So you can get help while you are working on your enties.Once your articles attract people to your blog and click on the ads. The admin of the blogsite will split profits from relevent advertisers with and you will actually get paid by showing readers your talents. Why don't give it a try.

Web Hosting

Web hosting is a service that provides individuals, organizations and users with online systems for storing information, images, video, or any content accessible via the Web. Web hosts are companies that provide space on a server they own for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center.
Types of hosting

Hosting can be split up into several general types:

* Free hosting: just about all the free web hosting available is extremely limited when compared to paid hosting. Free web hosts generally require their own ads on your site, only allow web-based uploading and editing of your site, and have very tight disk space and traffic limits. Still, most people get their start via free web hosting.
* Image hosting: hosting only a few different formats of images. This type of hosting is often free and most require registrations. Most image hosts allow hotlinking, so that you can upload images on their servers and not waste space/bandwidth on yours.
* Shared hosting: one's Web site is placed on the same server as several hundred other sites. A problem with another site on the server can bring all of the sites down. Shared hosting also brings with it some restrictions regarding what exactly can be done, although these restrictions are nowhere near as restrictive as for free hosting.
* Clustered hosting: designed to eliminate the problems inherent with typical shared hosting infrastructures, it offers the benefits of a dedicated server, but at affordable shared hosting prices. This hosting technology platform provides customers with a “clustered” handling of security, load balancing, and necessary Web site resources. Resources are virtualized beyond the limits of one physical server and dynamic load balancing disperses traffic to ensure performance is optimal for all customer accounts.
* Reseller hosting: designed for those who want to become Web hosts themselves. One gets a large amount of space and bandwidth that can be divided up among as many sites as the user wants to put on his account. A reseller account is placed on the same server with other reseller accounts, just like with shared hosting but there are fewer accounts.
* Virtual Private Server (or Virtual Dedicated Server) hosting: Virtual Private Server technology enables one physical server to house several Virtual Environments which behave exactly like an isolated stand-alone server. This is often a much more affordable solution than a dedicated server, normally offering all the same benefits, such as root access.
* Dedicated hosting: With dedicated hosting, one gets a server of one's own. They have no restrictions, except for those designed to maintain the integrity of the Web host's network (for instance, banning sites with adult content due to the increase risk of attack by crackers and grey legal issues for the ISP). Unless a separate plan is purchased from the host, the user is also generally on his own. This can be an expensive proposition, as the purchase of the dedicated server itself is generally far more expensive compared to shared hosting.
* Colocated hosting: This involves a server the user purchases himself and installs at the host's data center. Besides unmonitored reboots, the user must pay extra for many services dedicated hosting provides by default. Colocated hosting is generally chosen by people with server administration experience and those with more significant needs than which can be satisfied by dedicated or shared hosting. This is usually the most expensive and least cost effective option if you are not colocating many servers.

What is Spyware?

Spyware has become the most prominent computer security problem. How do you choose a good Spyware removal tool? Beware of "antispyware" software which installs spyware/adware to the computer.Spyware is a hidden software program. It is often used to monitor the browsing and shopping habits of computer users. Spyware can also be a remote control program that steals confidential banking and personal information. Spyware has quickly become the most prominent internet security problem. According to the National Cyber Security Alliance, spyware infects more than 90% of home PCs. Recent survey shows that spyware is also sneaking into the network of corporate computers.Spyware is often coupled with free downloads, such as free music, game and software downloads. Spyware may slow down computer, hijack homepage and create uncontrolled pop-up advertisements. Some spyware programs can remain unnoticed, secretly gathering information from the computer. Once installed, spyware is difficult to remove without the help of dedicated antispyware software. Due to the rise of spyware activity, antispyware programs are in great demand these days. But are these spyware removal tools the same? Do they provide the security consumers need?There are many reports that some antispyware programs installed their own spyware and adware to the computer. One consumer was quoted saying "It's a rip-off. I downloaded the free trial of an antispyware program, only to find out that it added its own adware to my computer". Other consumers have complained that the antispyware program they use cannot detect all spyware programs. Some even slow down the computer and create pop-up advertisements.Consumers should be aware that spyware removal tools that are heavily promoted by e-mail campaigns are not necessarily good programs. Beware of the free downloads and free scans from unknown software publishers. Their "antispyware" programs may as well be spyware programs themselves. To learn more about spyware and antispyware software.
The Future of Spyware:
"Facts do not cease to exist because they are ignored."-- Aldous HuxleyAs the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.By Gregg Keizer, Courtesy of TechWeb NewsBy the end of the year, spyware will have turned to RSS to distribute its key loggers and ad spawners, a security expert predicts.By the end of the year, spyware programs will have tripled in number, put Firefox in their sights, and have turned to RSS to distribute its key loggers and ad spawners, a security expert said Friday. Richard Stiennon, director of threat research at anti-spyware software vendor Webroot, first presented his six predictions at this week's Gartner IT Security Summit. number one on his list? "The first spyware that targets Firefox will appear in the first half of 2005," prognosticated Stiennon. "That means either a spyware writer will take advantage of a vulnerability in Firefox, as others already have in Internet Explorer, or create a site that forces Firefox to invisibly download and install adware or spyware." Stiennon's apparently not worried about the impending deadline for his prediction. "Test code against Firefox exists," he said, "and I've seen exploits against Firefox that don't work. At the Gartner conference, I had a conversation with the CIO of another security firm, and he said that his company had just found an example." Some of Stiennon's predictions were no-brainers, or in one case, with tongue firmly in cheek. "The number of new Microsoft vulnerabilities will grow," he said. "That was said tongue-in-cheek." Others, such as his bet that the number of different types of spyware will triple in 2005 to reach 4,500 total, is an easy prophecy, he added, since "we're well on our way for that number right now." In Stiennon's opinion, his most distressing prediction is that spyware will latch onal Simple Syndication) as a way to distribute ad- and spy-style software. "I'm extremely concerned about this," said Stiennon. "Already we're seeing marketers look to RSS. A recent list by marketing types on why RSS is better than e-mail, for example, had 'no more annoying complaints about spam' at number 8. Where marketers go, adware and spyware writers follow." Another nasty possibility, said Stiennon, is that a vulnerability will be found in one of the big blogging services. "If a spyware writer finds a way to inject code into a blogging site -- which could take the form of a SOAP object -- most likely through a future vulnerability in Internet Explorer 7, then everyone who subscribes to that service's blog RSS feeds is gonna get infected." Such an attack could be massive, and because of the automated nature of RSS, extremely fast-acting. Finally, Stiennon predicted that rootkits, hacker toolkits now used by the most sophisticated worm authors to hide evidence of their malicious code from anti-virus scanners, will migrate to spyware this year. "There's a very small group, under 2,000, of advanced spyware writers. They're already experimenting with rootkits, and when they start using them in numbers, spyware is going to be very very hard to detect." Stiennon's final prediction didn't make his list at Gartner's conference, but is no surprise considering how much space on his blog he's devoted to the recent Israeli incident where several companies' executives have been charged with industrial espionage after hiring private investigators who in turn used a British programmer's spyware Trojan to infect rivals' computers.