Thursday, September 13, 2007

future tense review( A trip Through Time)

write your answer in everyday contexts:

Topics: Destiny

Building words:

Review: Future Tense

Topics: what kind of person do you select as a janitor?

topics:Legwork,Legman

words:

scandal
rumer
meager
scatter
scope
mud
scrub

Idioms:

make your blood boil
have sweet teath
keep on SB eye
pat on the back
way above my head
every Tom ,Dick and Harry
way above my head
spill the bean
tied knot
pope catholic
put cart before the horse
shoot oneself in the foot.

Type of ice cream:

ice cream cone
ice cream scoop
ice cream lollipop
ice cream cup
ice cream pack
ice cream sandwitch
ice cream bar

Correct the following sentences:

1- you have to pay the tickets in advance.
you have to pay forthe tickets in advance.
2-psychologist point the importance for children of having contact with both parants.
psychologist point at the importance for children of having contact with both parants.
3- is there a possibility to find a cure for AIDS?
is there a possibility for finding a cure for AIDS?
4- i have more possibility to travel than my parents did.
i have more opportunity to travel than my parents did.
5-your advertisement doesn't precise whether flights are included in the price.
your advertisement doesn't explain whether flights are included in the price.
6-he promised to his mom he would clean his room.
he promised his mom he would clean his room.
7- I decided to accept the job proposal.
I decided to accept the job offer.
8-as you don't have much time, I propose you fly to paris.
as you don't have much time, I suggest you fly to paris.
9- could you provide us a list of hotels in the area?
could you provide us with a list of hotels in the area?
10-we weren't allowed to make any questions.
we weren't allowed to ask any questions.
11-the project has now reached to the final stage.
the project has now reached the final stage.
12-i wrote a letter to require more information.
i wrote a letter to ask for more information.
13-the price of gas is raising.
the price of gas is rising.
14- we had seat at the back row
we had seat in the back row

Labor Day:

Labor Day is a holiday honoring working men and women.
It is observed on the first Monday in September.
The United States, Puerto Rico and Canada all observe the first Monday of September as Labor Day. Australia celebrates the Eight Hour Day commemorating their successful struggle for a shorter work day and Europe celebrates Labor Day on May 1.
The first observance of this holiday in the United States came in September of 1882
when a
Labor Day Parade
was held by the
Knights of Labor in New York City.
Matthew M. Maguire and Peter J. McGuire contributed greatly to this event and are credited as the founders of this holiday observance, as they were the first to suggest there be a day of observance honoring working people here in the United States. Peter J. McGuire, a New York City carpenter, helped found the United Brotherhood of Carpenters and Joiners.
Two years later, in 1884 the group held a parade on the first Monday of September and a resolution was adopted to hold all future parades on that day and to designate the day, Labor Day.
In 1887, Oregon became the first state to make Labor Day a legal holiday. In 1894, President Grover Cleveland signed a bill making Labor Day a national holiday.



The day is usually observed with cookouts, weekend trips, fun events or just plain relaxation. Some labor organizations and businesses hold gatherings for their members and workers to celebrate the day together.

Who's watching you?

Electronic eyes and ears can follow your every move
BY CHRIS WOOD WITH BRENDA BRANSWELL AND AMY CAMERON
FROM MACLEAN’S

________________________________________
Darryl and Donna* had a good life until the new computer arrived in their Manitoba home in October 2000. Soon afterwards, Darryl’s spouse of 15 years began, as he puts it, “acting funny.” Housework went undone, he says, while Donna sat at the screen by the hour. Suspicion finally overcame him. Charging $105 to his credit card, Darryl downloaded some software from the Internet and installed it on the PC. Then he went to bed and left the machine to his wife.
“I got up at five the next morning,” Darryl says. “I turned on the computer, and I saw what I didn’t want to see.” The program from Florida-based SpectorSoft Corporation had done exactly what it promised. In heartbreaking detail, it had recorded every remark Donna typed into a chat window, including the explicit sex talk she had shared with several men.
Welcome to the age of anywhere, anytime, anybody surveillance. Technologies first conceived by national spy agencies and the military are now being retooled as security products for home and business. Civilian programmers have been creating new breeds of spyware to exploit the inherent vulnerabilities of the digital environment. And as hardware prices drop and software flits effortlessly across the Net, privacy-busting tools are turning up in the 7-Eleven, the office cubicle—and the bedroom. To keep them at bay, the future may be one in which every citizen has a secret key to encrypt his cyberthoughts, and multiple identities to conceal his true one.

While it is true that new technologies for surveillance and concealment have naturally found fans among criminals, creeps and perverts, companies are also spying—on their workers and their customers. The American Management Association says two out of every three major U.S. companies monitor employees on-line. And governments in several countries have given themselves new rights to snoop on their citizens. Even as fearless a fellow as former RCMP commissioner Norman Inkster, who now runs KPMG Investigation and Security Inc., admits, “There’s a point where one needs
to be concerned Big Brother is watching.”
Unlike the malignant state agency of George Orwell’s fiction, though, the new millennium has democratized surveillance. Anyone can spy. That is particularly evident in the plummeting price and widening availability of covert audio- and video-surveillance devices. A video camera about the size of a pack of matches retailed for $800 a decade ago but today costs less than $150. Sound recorders connected to microphones hidden in pens go for under $200. Drop in at Spy-Central, in Vancouver—or any store like it in any Canadian city—and you might stroll out with a charming art-deco mantel clock. Concealed behind the face is a video camera. Cost: about $300.
Other new technologies are extending the capabilities of those ubiquitous video security monitors. By one estimate, they record the image of every urban Canadian up
to 15 times a day. Biometric software can then be used to match the images to vast police databases of photo IDs. Indeed, many casinos deploy similar software to identify and keep out known cheats. At last January’s Super Bowl in Tampa, Fla., authorities scanned the faces of 100,000 people entering the stadium, identifying 19 possible matches to individuals with criminal records.
Your cellular phone can also be used to track you down. Several companies are racing to perfect location technology. When a person places a call, carriers record which cell, or transmitter area, the call is coming from. The telephone number of the caller, the number called and the length of the call are logged for billing. With a court order, all of these data can provide a record of someone’s movements. With some effort, phones can be tracked even when not in use, as long as they are turned on.
Even now, the exact location of a wireless call can be pinpointed to within three metres using a built-in Global Positioning System, or within 30 to 60 metres using triangulation on the cell network. Fleet companies in Calgary recently tested Cell-Loc equipment to track their staff during business hours.

But it is the Internet where privacy’s defences are most porous. However you access the Net, you do it through an Internet service provider (ISP). If an ISP wants to, it can reveal the Internet address of everyone you send an e-mail to, the contents of the e-mail and every file you download, and the address of every site you visit.
From legitimate scrutiny by employers to the schemes of sexual predators, the Net’s digital underpinnings and culture of anonymity expose users to a jungle of on-line risks. “Cyberstalking is a very big complaint,” says Det. Bruce Headridge of the Organized Crime Agency of British Columbia, based in Vancouver.** The number of complaints is increasing all the time, he says, frequently after a contact made in a chat room turns sour. A common stalker ploy is to send copies of indiscreet e-mails to employers, in hopes of having the victim fired.

The net has also unleashed a spate of “lurings”—instances of older men, and occasionally women, using the Internet to target children, whom they then persuade to leave home and join them. In one case, a 58-year-old man from Oregon introduced himself to a 12-year-old boy from the B.C. interior as another 12-year-old, eventually persuading his target to buy a bus ticket to Seattle. The youngster’s father intervened before he left home, and the Oregon man was arrested. In another case, a 21-year-old Saskatchewan woman convinced a 14-year-old B.C. boy to run away from home with her; they lived in her car until the boy’s parents and social workers were able to intervene. In each case, the lurers took advantage of anonymity on the Internet to disarm their victims in the artificial intimacy of on-line chat rooms.
“If a stranger came to your door wearing a bag over his head,” suggests Det. Noreen Waters of the Vancouver police, “and said he wanted to spend hours with your child in his or her bedroom with the door closed, would you let him in? Yet every day, parents are allowing strangers into their kids’ bedrooms through the Internet.”
Misuse of e-mail need not be criminal to be painful. Canadian Forces naval Capt. David Marshall lost his command of CFB Esquimalt on Vancouver Island after flirtatious e-mails exchanged with a woman other than his wife surfaced in a local paper.
Such misfortunes reflect as much on individual judgement as on the nature of the Net. But determined digital intruders have more-specialized tools at their disposal. Back Orifice is one program hackers use to seize control of a PC. Once activated, Back Orifice lets the remote hacker treat the target computer as his own, accessing password files and even controlling attached devices.

Criminals hide their own identity on-line; they can also steal yours—or at least enough personal information to masquerade as you. Data banks containing credit-card information are high on hacker target lists—and are routinelybreached. Last January police heard from three Halifax computer companies that someone was using credit-card accounts to make unauthorized purchases. The card numbers it turned out, had been stolen from databases in the United States and Britain—by hackers in eastern Europe.

Not everyone sneaking around on-line is a bad guy, however. The same anonymity that empowers predators on the Net can be put to use by their pursuers. Former B.C. MLA George Kerster exchanged e-mails with someone who claimed to have a “curious and un-developed” 11-year-old girl available for sex. In subsequent e-mails, Kerster expressed his interest in meeting her. On January 12, 1999, Kerster met a woman claiming to be the girl’s mother at a Vancouver fast-food joint and followed her to a hotel to consummate the deal. It was there that he learned he had been corresponding with police. A B.C. Supreme Court justice found Kerster guilty of attempting to obtain the sexual services of a minor.
Police in every major country have pressed for new powers to intercept what travels over the Internet. In 1999 Australia gave its authorities the right to hack into suspects’ computers. More recently, British and U.S. police won government blessing for their plans to install eavesdropping devices on Internet service providers’ premises. The devices—ominously code-named Carnivore in the American case—act much like telephone taps, allowing police to intercept e-mail messages to and from a specified Internet address. Canada has yet to give its police similar authority, but a report declassified in 2000 by the normally secretive federal Communications Security Establishment (CSE), and obtained by Southam News, argued that e-mail interception “may be required” for the CSE to protect government computer networks against viruses.

Businesses, too, have found uses for on-line surveillance. Some are controversial, but most are sanctioned by law. Many web sites place tiny scraps of text, called cookies, onto the computers of Web surfers who visit. The text contains information that identifies the computer so the site can recognize it as a repeat customer if it returns. But some companies can also use cookies to track a computer’s visits to other web sites and record the user’s surfing habits.

Whatever your e-store is up to, you boss’s right to spy on you is, legally speaking, well-nigh unassailable. “It has always been cause for dismissal if you’re not using company time to
do company work,” explains Paul Kent-Snowsell, a Vancouver lawyer who specializes in Internet cases. During the summer of 2000, Dow Chemical Co. fired 61 employees in Texas and Michigan for using their computers to circulate pornography—joining the 27 percent of surveyed U.S. companies that have fired workers for e-mail or Internet abuse.
There may be no simple defence against being spied on. But tools are emerging to reduce the vulnerability of private e-mail and to help solve the flip side of the “lurer” problem: how to prove you are who you say you are on-line. Several vendors sell software that will encrypt digital documents and, if you like, sign them with a nearly unbreakable code identifying you as the sender. Ottawa, meanwhile, plans to begin a pilot project later this year that will enable citizens to access selected federal services on-line using “digital signatures” to confirm the identity of the individual and make transmissions more secure.
For those who don’t wish to be followed on-line by trails of e-commerce cookies, so-called anonymizing software can create digital pseudonyms that allow subscribers to surf the Web anonymously. Alex Fowler, senior director of information policy for Canada’s Zero-Knowledge Systems Inc., sees it becoming the norm for every citizen to maintain multiple identities for on-line activities—one to shop, another to deal with government and perhaps several more for use in chat rooms.
Consumer versions of corporate firewalls that deter some kinds of intrusion are available. Internet Security Systems BlackICE, Norton Personal Firewall, McAfee.com Personal Firewall and Zero-Knowledge’s Freedom are among popular software packages that protect home-PC users from programs like Back Orifice. Many such home firewalls also let users disable commercial cookies.

Alex fowler, the privacy software developer, and Norman Inkster, the former Mountie, share a common fear. Both worry that the reach of surveillance technology is expanding faster than most ordinary citizens know—and that it could soon become more frighteningly all-embracing. To Inkster, controlling the criminals means accepting new means of surveillance, but with checks and balances to protect privacy. “In the past, we could sometimes make a certain assumption of privacy,” Inkster reflects, “because we knew the technology couldn’t be there. Now the technology is there. The question becomes, Will the law ever catch up?”
To retired Toronto businessman Wilson Markle, who has installed software on the PCs of his two children to monitor what they access on-line, there’s no doubt: The race is over and technology has won. “Anybody who doesn’t have a thing to hide has no problem,” he says. “Those who do have something to hide will have a problem. I take comfort in that.”

Legal Alien :

Bi-lingual, Bi-cultural,
able to slip from "How's life?"
to "Me'stan volviendo loca,"
able to sit in a paneled office
drafting memos in smooth English,
able to order in fluent Spanish
at a Mexican restaurant,
American but hyphenated,
viewed by Anglos as perhaps exotic,
perhaps inferior, definitely different,
viewed by Mexicans as alien,
(their eyes say, "You may speak
Spanish but you're not like me")
an American to Mexicans
a Mexican to Americans
a handy token
sliding back and forth
between the fringes of both worlds
by smiling
by masking the discomfort
of being pre-judged
Bi-laterally.
Pat Mora

Shy,shame, embarrass

Words:

1-tangle
2-trough
3-inadvertant
4-out and about
5-tabs
6-surveillance
7-down to earth
8-on the flip side
9-outvalue
10-crowd(v)
11-jumble
12-to settle of score
13-neck & neck
14-chosy, selective , picky