Saturday, May 19, 2012

'CHAN' (FACEBOOK FOUNDER)'S NEW GIRLFRIEND

Facebook Billionaire's Girlfriend Priscilla Chan

(Reuters)Mark Zuckerberg isn't the only one who's had a big week. On Monday, Priscilla Chan, the longtime partner of the 28-year-old Facebook founder, earned her medical degree from a top institution in the country, just days after inspiring a revolution in organ donor access. Also: her boyfriend just turned his first job into $21 billion dollars as of this morning, so that's cool too.

Facebook IPO frenzy: should you buy in?
So far it's been a good month for Priscilla, the Harvard alum, who met Zuckerberg at a campus frat party almost a decade ago. On May 14, while the tech world marked Zuckerberg's 28th birthday, Chan was picking up her degree from University of California, San Francisco's School of Medicine, and even icing her degree with membership into the exclusive National Medical Honor Society.

Facebook IPO: Follow it live
While her boyfriend's expertise seems to be in working the market into a frenzy, Chan's specialty is in pediatrics. Already, her medical experience is saving lives on a large scale. Earlier this month, Facebook launched a new feature allowing users to add their organ donation status to their profiles. Zuckerberg credits the idea to Chan. "She's going to be a pediatrician, so our dinner conversations are often about Facebook and the kids that she's meeting," Zuckerberg told ABC News. After a few particularly heart-rending accounts of children in need of organ transplants at her hospital, Facebook's CEO developed the donor tool and effectively enlisted more than 1,000 new donors in a matter of days, according to Donor Life.

Photos: Mark Zuckerberg and Priscilla Chan on vacation together
It was a shift for Zuckerberg's brand, more often linked to lawsuits and financial speculation than saving lives. But 'Cilla,' as her boyfriend calls her, is in many ways Facebook's better half. The woman not so much behind the man, but running parallel, with equally bold strides. It's a new improved model for the so-called billionaire's wife...make that partner.

Despite rumors of an engagement two years ago, Chan and Zuckerberg aren't married. That means his big-time earnings today won't go directly into her pocket. Not that she hasn't experienced some perks. Living in low-key domesticity with their dog, Beast, the 20-somethings recently upgraded their digs to a $7 million Palo Alto home with a massive kitchen and plenty of privacy. They've also traveled to Vietnam and Shanghai for romantic vacations (that sometimes turn into work for Mark). If anything, her boyfriend's IPO explosion could have been more of a challenge than a boon. Chan reportedly has strict rules about weekly work-free dates where the couple can forget about Facebook. Zuckerberg's recent investor campaign may have put a dent in that routine.

But overall, Zuckerberg's cash crop could only be Prsicilla's gains should the couple decide to wed.
If you ask Donald Trump, and unfortunately someone at CNBC's Squawk Box did, Chan would walk away with a chunk of change in the event of a pre-nup free divorce (that's jumping the gun a little, no?)

If they divorced, says Trump, "she's hits the jackpot like nobody...I could see the lawyers and the lawsuit right now. Without her brilliant decision-making, he would have never come through. She advised him, she made dinner for him, she's entitled to at least $10 billion."

This is all assuming that Chan even wants to wed, no less divorce, Zuckerberg. Not everyone thinks, or dates, like Trump. For now, it seems Chan's big concern is saving the lives of kids, and that's probably one reason why her unfathomably rich boyfriend loves her. As the world stares slack-jawed at Zuckerberg's accomplishments, he's doing the same with his girlfriend.

After Priscilla earned her degree Monday, Mark posted the following message for her on Facebook.

I'm so proud of you, Dr. Chan : )
Yes, that's a billion-dollar emoticon smile.

WHAT IS AN SQL INJECTION AND ITS TYPES


-->
SQL injection
From Wikipedia, the free encyclopedia
Jump to: navigation, search
SQL injection is a technique often used to attack databases through a website. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g. dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in a website's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL commands are thus injected from the web form into the database of an application (like queries) to change the database content or dump the database information like credit card or passwords to the attacker. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.
In operational environments, it has been noted that applications experience, on average, 71 attempts an hour.[1] When under direct attack, some applications occasionally came under aggressive attacks and at their peak, were attacked 800–1300 times per hour.[1]
Forms and Validity
SQL Injection Attack (SQLIA) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.[2] The attacking vector contains five main sub-classes depending on the technical aspects of the attack's deployment:
  • Classic SQLIA
  • Inference SQL Injection
  • Interacting with SQL Injection
  • DBMS specific SQLIA
  • Compounded SQLIA
Some security researchers propose that Classic SQLIA is outdated[3] though many web applications are not hardened against them. Inference SQLIA is still a threat, because of its dynamic and flexible deployment as an attacking scenario. The DBMS specific SQLIA should be considered as supportive regardless of the utilization of Classic or Inference SQLIA. Compounded SQLIA is a new term derived from research on SQL Injection Attacking Vector in combination with other different web application attacks as:
A complete overview of the SQL Injection classification is presented in the next figure. The Storm Worm is one representation of Compounded SQLIA.[8]
A Classification of SQL Injection Attacking 
Vector till 2010
http://bits.wikimedia.org/static-1.20wmf2/skins/common/images/magnify-clip.png
A Classification of SQL Injection Attacking Vector till 2010
This classification represents the state of SQLIA, respecting its evolution until 2010—further refinement is underway.[9]
Technical Implementations
 Incorrectly filtered escape characters
This form of SQL injection occurs when user input is not filtered for escape characters and is then passed into an SQL statement. This results in the potential manipulation of the statements performed on the database by the end-user of the application.
The following line of code illustrates this vulnerability
statement = "SELECT * FROM users WHERE name = '" + userName + "';"
This SQL code is designed to pull up the records of the specified username from its table of users. However, if the "userName" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the "userName" variable as
' or '1'='1
or using comments to even block the rest of the query (there are three types of SQL comments):[10]
' or '1'='1' -- '
' or '1'='1' ({ '
' or '1'='1' /* '
renders one of the following SQL statements by the parent language:
SELECT * FROM users WHERE name = '' OR '1'='1';
SELECT * FROM users WHERE name = '' OR '1'='1' -- ';
If this code were to be used in an authentication procedure then this example could be used to force the selection of a valid username because the evaluation of '1'='1' is always true.
The following value of "userName" in the statement below would cause the deletion of the "users" table as well as the selection of all data from the "userinfo" table (in essence revealing the information of every user), using an API that allows multiple statements:
a';DROP TABLE users; SELECT * FROM userinfo WHERE 't' = 't
This input renders the final SQL statement as follows and specified:
SELECT * FROM users WHERE name = 'a';DROP TABLE users; SELECT * FROM userinfo WHERE 't' = 't';
While most SQL server implementations allow multiple statements to be executed with one call in this way, some SQL APIs such as PHP's mysql_query(); function do not allow this for security reasons. This prevents attackers from injecting entirely separate queries, but doesn't stop them from modifying queries.
Incorrect type handling
This form of SQL injection occurs when a user-supplied field is not strongly typed or is not checked for type constraints. This could take place when a numeric field is to be used in a SQL statement, but the programmer makes no checks to validate that the user supplied input is numeric. For example:
statement := "SELECT * FROM userinfo WHERE id = " + a_variable + ";"
It is clear from this statement that the author intended a_variable to be a number correlating to the "id" field. However, if it is in fact a string then the end-user may manipulate the statement as they choose, thereby bypassing the need for escape characters. For example, setting a_variable to
1;DROP TABLE users
will drop (delete) the "users" table from the database, since the SQL would be rendered as follows:
SELECT * FROM userinfo WHERE id=1;DROP TABLE users;
Blind SQL injection
Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established.[11]
Conditional responses
One type of blind SQL injection forces the database to evaluate a logical statement on an ordinary application screen.
SELECT booktitle FROM booklist WHERE bookId = 'OOk14cd' AND '1'='1';
will result in a normal page while
SELECT booktitle FROM booklist WHERE bookId = 'OOk14cd' AND '1'='2';
will likely give a different result if the page is vulnerable to a SQL injection. An injection like this may suggest to the attacker that a blind SQL injection is possible, leaving the attacker to devise statements that evaluate to true or false depending on the contents of another column or table outside of the SELECT statement's column list.[12]
SELECT 1/0 FROM users WHERE username='ooo';
Another type of blind SQL injection uses a conditional timing delay on which the attacker can learn whether the SQL statement resulted in a true or in a false condition [13]
Mitigation
Parameterized statements
With most development platforms, parameterized statements can be used that work with parameters (sometimes called placeholders or bind variables) instead of embedding user input in the statement. A placeholder can only store the value of the given type and not the arbitrary SQL fragment. Hence the SQL injection would simply be treated as a strange (an probably invalid) parameter value.
In many cases, the SQL statement is fixed, and each parameter is a scalar, not a table. The user input is then assigned (bound) to a parameter. [14]
Enforcement at the coding level
Using object-relational mapping libraries avoids the need to write SQL code. The ORM library in effect will generate parameterized SQL statements from object-oriented code.
Escaping
A straightforward, though error-prone, way to prevent injections is to escape characters that have a special meaning in SQL. The manual for an SQL DBMS explains which characters have a special meaning, which allows creating a comprehensive blacklist of characters that need translation. For instance, every occurrence of a single quote (') in a parameter must be replaced by two single quotes ('') to form a valid SQL string literal. For example, in PHP it is usual to escape parameters using the function mysql_real_escape_string(); before sending the SQL query:
$query = sprintf("SELECT * FROM `Users` WHERE UserName='%s' AND Password='%s'",
                  mysql_real_escape_string($Username),
                  mysql_real_escape_string($Password));
mysql_query($query);
This function, i.e. mysql_real_escape_string(), calls MySQL's library function mysql_real_escape_string, which prepends backslashes to the following characters: \x00, \n, \r, \, ', " and \x1a. This function must always (with few exceptions) be used to make data safe before sending a query to MySQL.[15]
There are other functions for many database types in PHP such as pg_escape_string() for PostgreSQL. There is, however, one function that works for escaping characters, and is used especially for querying on databases that do not have escaping functions in PHP. This function is: addslashes(string $str ). It returns a string with backslashes before characters that need to be quoted in database queries, etc. These characters are single quote ('), double quote ("), backslash (\) and NUL (the NULL byte).[16]
Routinely passing escaped strings to SQL is error prone because it is easy to forget to escape a given string. Creating a transparent layer to secure the input can reduce this error-proneness, if not entirely eliminate it.[17]
Pattern check
Integer, float or boolean parameters can be checked if they value is valid representation for the given type. Strings that must follow some strict pattern (date, UUID, alphanumeric only, etc.) can be checked if they match this pattern.
Database Permissions
Limiting the permissions on the database logon used by the web application to only what is needed may help reduce the effectiveness of any SQL injection attacks that exploit any bugs in the web application.
For example on SQL server, a database logon could be restricted from selecting on some of the system tables which would limit exploits that try into insert JavaScript into all the text columns in the database.
deny SELECT ON sys.sysobjects TO webdatabaselogon;
deny SELECT ON sys.objects TO webdatabaselogon;
deny SELECT ON sys.TABLES TO webdatabaselogon;
deny SELECT ON sys.views TO webdatabaselogon;

HOW TO HACK YOUR FRIENDS WEAK PASSWORDS

How I’d Hack Your Weak Passwords

If you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I’ll probably get into all of them.
  1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
  2. The last 4 digits of your social security number.
  3. 123 or 1234 or 123456.
  4. “password”
  5. Your city, or college, football team name.
  6. Date of birth – yours, your partner’s or your child’s.
  7. “god”
  8. “letmein”
  9. “money”
  10. “love”
Statistically speaking that should probably cover about 20% of you. But don’t worry. If I didn’t get it yet it will probably only take a few more minutes before I do…

Hackers, and I’m not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)
One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.
So, how would one use this process to actually breach your personal security? Simple. Follow my logic:
  • You probably use the same password for lots of stuff right?
  • Some sites you access such as your Bank or work VPN probably have pretty decent security, so I’m not going to attack them.
  • However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you’ve shopped at might not be as well prepared. So those are the ones I’d work on.
  • So, all we have to do now is unleash Brutus, wwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.
  • Once we’ve got several login+password pairings we can then go back and test them on targeted sites.
  • But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser’s cache. (Read this post to remedy that problem.)
And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker’s computer, and the speed of the hacker’s Internet connection.
Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it’s just a matter of time before the computer runs through all the possibilities – or gets shut down trying.
Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters – like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.
Password LengthAll CharactersOnly Lowercase
3 characters
4 characters
5 characters
6 characters
7 characters
8 characters
9 characters
10 characters
11 characters
12 characters
13 characters
14 characters
0.86 seconds
1.36 minutes
2.15 hours
8.51 days
2.21 years
2.10 centuries
20 millennia
1,899 millennia
180,365 millennia
17,184,705 millennia
1,627,797,068 millennia
154,640,721,434 millennia
0.02 seconds
.046 seconds
11.9 seconds
5.15 minutes
2.23 hours
2.42 days
2.07 months
4.48 years
1.16 centuries
3.03 millennia
78.7 millennia
2,046 millennia
Remember, these are just for an average computer, and these assume you aren’t using any word in the dictionary. If Google put their computer to work on it they’d finish about 1,000 times faster.
Now, I could go on for hours and hours more about all sorts of ways to compromise your security and generally make your life miserable – but 95% of those methods begin with compromising your weak password. So, why not just protect yourself from the start and sleep better at night?
Believe me, I understand the need to choose passwords that are memorable. But if you’re going to do that how about using something that no one is ever going to guess AND doesn’t contain any common word or phrase in it.
Here are some password tips:
  1. Randomly substitute numbers for letters that look similar. The letter ‘o’ becomes the number ’0′, or even better an ‘@’ or ‘*’. (i.e. – m0d3ltf0rd… like modelTford)
  2. Randomly throw in capital letters (i.e. – Mod3lTF0rd)
  3. Think of something you were attached to when you were younger, but DON’T CHOOSE A PERSON’S NAME! Every name plus every word in the dictionary will fail under a simple brute force attack.
  4. Maybe a place you loved, or a specific car, an attraction from a vacation, or a favorite restaurant?
  5. You really need to have different username / password combinations for everything. Remember, the technique is to break into anything you access just to figure out your standard password, then compromise everything else. This doesn’t work if you don’t use the same password everywhere.
  6. Since it can be difficult to remember a ton of passwords, I recommend using Roboform for Windows users. It will store all of your passwords in an encrypted format and allow you to use just one master password to access all of them. It will also automatically fill in forms on Web pages, and you can even get versions that allow you to take your password list with you on your PDA, phone or a USB key. If you’d like to download it without having to navigate their web site here is the direct download link.
  7. Mac users can use 1Password. It is essentially the same thing as Roboform, except for Mac, and they even have an iPhone application so you can take them with you too.
  8. Once you’ve thought of a password, try Microsoft’s password strength tester to find out how secure it is.
By request I also created a short RoboForm Tutorial. Hope it helps…
Another thing to keep in mind is that some of the passwords you think matter least actually matter most. For example, some people think that the password to their e-mail box isn’t important because “I don’t get anything sensitive there.” Well, that e-mail box is probably connected to your online banking account. If I can compromise it then I can log into the Bank’s Web site and tell it I’ve forgotten my password to have it e-mailed to me. Now, what were you saying about it not being important?
Often times people also reason that all of their passwords and logins are stored on their computer at home, which is save behind a router or firewall device. Of course, they’ve never bothered to change the default password on that device, so someone could drive up and park near the house, use a laptop to breach the wireless network and then try passwords from this list until they gain control of your network – after which time they will own you!
Now I realize that every day we encounter people who over-exaggerate points in order to move us to action, but trust me this is not one of those times. There are 50 other ways you can be compromised and punished for using weak passwords that I haven’t even mentioned.
I also realize that most people just don’t care about all this until it’s too late and they’ve learned a very hard lesson. But why don’t you do me, and yourself, a favor and take a little action to strengthen your passwords and let me know that all the time I spent on this article wasn’t completely in vain.
Please, be safe. It’s a jungle out there.

Friday, May 18, 2012

FIRST PRIVATE ROCKET TO BE LAUNCHED

Private Rocket Poised to Make History With Saturday Launch

 
CAPE CANAVERAL, Fla. — A private spacecraft stands ready to launch on a historic first visit to the International Space Station tomorrow (May 19).
The unmanned Dragon space capsule, built by commercial firm SpaceX, is slated to lift off atop the company's Falcon 9 rocket early Saturday from here at the Cape Canaveral Air Force Station. The spacecraft has an instantaneous launch window at 4:55 a.m. EDT (0855 GMT), with a 70 percent chance of good weather predicted (the main risk of a delay is posed by the possibility of cumulus clouds).
The SpaceX Falcon 9 rocket carrying the first Dragon spacecraft bound for the International Space Station is seen restingatop SpaceX’s launch site in Cape Canaveral, Fla. If all goes well, Dragon will fly by the space station on Monday (May 21) and rendezvous and berth at the outpost the day after, becoming the first non-governmental vehicle to do so. The mission is the final test flight planned for Dragon, which has been developed under NASA's COTS (Commercial Orbital Transportation Services) program aimed at nurturing private spacecraft to supply the International Space Station.
The mission is a critical test for NASA's plan to outsource transportation to low-Earth orbit to the commercial sector, allowing the agency to begin work on a new heavy-lift rocket for deep space. Some in Congress and elsewhere have been critical of the scheme, arguing that private vehicles are untested and less reliable than NASA's in-house built spacecraft. [Photos: SpaceX Poised for Historic Launch]
If Saturday's launch is successful, it could help sway the naysayers, NASA administrator Charles Bolden said.
"I think it will make a tremendous difference," Bolden told SPACE.com in April. "Everybody wants to see performance. You can promise things all you want, but nothing works like actual performance, and so it's a very important mission for SpaceX but an incredibly important mission for us at NASA."
SpaceX (officially Space Exploration Technologies Corp. of Hawthorne, Calif.) has designed Dragon to fly robotically at first, though the company has designs to man-rate the capsule. Eventually, Dragon is planned to be able to carry up to seven crewmembers to orbit, and could be used to transport astronauts as well as cargo to the space station.
For this test flight, Dragon is loaded with 1,014 pounds (460 kilograms) of cargo for the orbiting laboratory, including 674 pounds (306 kg) of food, clothing and supplies for the station's six-man crew. It will also deliver scientific equipment and electronic hardware, including a laptop.
If the capsule's on-orbit checkouts go smoothly, then on Tuesday (May 22), NASA astronaut Don Pettit and European Space Agency flyer Andre Kuipers use the space station's 57.7-foot (17.6-meter) robotic arm to reach out and grab Dragon and berth it to the station's Harmony node.
The vehicle is scheduled to stay at the outpost for about two weeks. Then, it will be unberthed and will head back to Earth where it is planned to re-enter the atmosphere and land in the Pacific Ocean.
In contrast to the other unmanned vehicles that ferry cargo to the space station, Dragon is equipped with a heat shield to survive re-entry and be recovered after landing. Thus, before it departs the station, astronauts plan to load it full of science experiments ready for analysis on the ground, as well as used hardware to be returned to NASA. 

Wednesday, May 16, 2012

PIANO CHORD TO ANTHEM OF PRAISE BY RICHARD SMALLWOOD

ANTHEM OF PRAISE

Richard Smallwood
Bbm


LH / RH  WORDS  [SINGLE NOTES]

INTRO: [Bb_F_Bb_Bb_Eb_Ab_Bb_Db_C_Db_Eb_F_Bb]
BbF / Bbm7
AbEb / Ab9
GbDb / Gb
FC / Ab
DbAb / FAbBEb
EbBb / Ebm7
CG / BbEbGb
FC / F
~~~~~~~~~~~~~
BbF / Bbm7  PRAISE HIM WITH THE TIMBLE AND DANCE
AbEb / Ab9  PRAISE HIM WITH THE SOUND OF THE TRUMPET
GDb / FGBbDb  PRAISE HIM WITH THE PSALTRY AND HARP
C / Adim7  LET EVERY -
DbAb / Bbm7  THING THAT HAS
EbC / Gbdim7  BREATH
FC / F  PRAISE
AEb / Adim7  THE
~~~~~~~~~~~~~~~~~~BACK TO THE TOP
FC / F  LORD [ O MAGNIFY THE LORD] [MAGNIFY THE LORD WITH ME] REPEAT
C / Adim7  LET US
DbAb / Bbm7  EXHALT HIS
EbC / Gbdim7  NAME
FC / F  TO
AEb / Adim7  GETHER
~~~~~~~~~~~~~~~~~~~~~~BACK TO TOP
BbF / Bbm7  ALL REJOICEFUL
GbDb / Bbm7  ALL YE PEOPLE
EbBb / GbM7  ALL REJOICEFUL
FC / F7 - AND
GDb / Gdim7 - CLAP
AEb / Ddim7 - YOUR
BbF / Bbm7  HANDS
~~~~~~~~~~~~~~~~~~~~~REPEAT
GDb / Gdim7 - CLAP
AEb / Ddim7 - YOUR
FC / F  HANDS [ OOOO]
FC / Gdim - [ OOOO]
FB / Eb - [ OOOO]
FB / Db-[ OOOO]
AbEb / Ab - PRAISE
GbDb / Gb - HIM
~~~~~~~~~~~~~~~~~~~~REPEAT

EbC / F - [ OOOO]
EbAb / Bb9(BbDF) - - [ OOOO]
EBb / Edim7 - [ OOOO]
FC / F  - [ OOOO]
AbEb / Ab - PRAISE
GbDb / Gb  HIM
~~~~~~~~~~~~~~~~~~~~~~
AbEb / Bb - [ OOOO]
GbBb / Adim7 - - [ OOOO]
CG / C - EbC / F - [ OOOO]
FEb / AM7(b5)  PRAISE HIS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BbF / Bb7  AD LIB AND VAMP [ " LIFT HIM UP " ]
BF / AM7(b5) - [ " LIFT HIM UP " ]
CG / BbM7(b5) - [ " LIFT HIM UP " ]
DbAb / BM7(b5) - [ " LIFT HIM UP " ]
C / Ebm7  LET EVERY
Db / Db THING THAT HAS
Eb / Gb6  BREATH
E / Edim7  PRAISE
F / Ebdim7  THE
BbF / Bbm7 - LORD

LYRICS EVERYTHING THAT HAS BREATH PRAISE THE LORD



Verse 1:

TENORS:
Praise Him with the timbrel and dance,
Praise Him with the sound of the trumpet,
Praise Him with the psaltery and harp;
Let everything that hath breath praise the Lord.

Altos/Sopranos Tenors:
(Praise Him) with timbrel and dance,
(Praise Him) on the high sounding cymbals,
(Oh, praise Him) with string instruments;

TENORS:
Let everything that hath breath praise the Lord.


TENORS:
Let everything that hath breath praise the Lord.
ALL:
Oh, magnify the Lord,
Magnify the Lord with me.
Magnify the Lord,
Oh, magnify the Lord with me.
Magnify the Lord,
Magnify the Lord with me.
Magnify the Lord,
TENORS:
Let us exalt His name together.

Verse 2:

TENORS:
Praise Him with the timbrel and dance,
Praise Him with the sound of the trumpet.
Praise Him with the psaltery and harp;
Let everything that hath breath praise the Lord.

Altos/Sopranos Tenors:
(Praise Him) with timbrel and dance,
(Praise Him) on the high sounding cymbals,
(Oh, praise Him) with string instruments;

TENORS:
Let everything that hath breath praise the Lord.

ALL:
Oh, magnify the Lord,
Magnify the Lord with me.
Magnify the Lord,
Oh, magnify the Lord with me.
Magnify the Lord,
Magnify the Lord with me.
Magnify the Lord
Tenors:
Let us exalt His name together.

Bridge 1

TENORS: REPEAT 10X – TENORS DIVIDE 3X
Oh, be joyful all ye people. Oh, be joyful and Clap your hands.

ALTOS: JOIN ROUND 5TH TIME
Oh, be joyful all ye people and clap your Hands.

SOPRANOS: JOIN ROUND 7TH TIME
All ye people, all ye people and clap your Hands.

Bridge 2:

TENORS: REPEAT 8X
Oh, oh, oh, oh, praise Him.

ALTOS: JOIN 3RD TIME
Oh, oh, oh, oh, praise Him.

SOPRANOS: JOIN 5TH TIME
Oh, oh, oh, oh, praise Him.

8th Time: Sopranos:
Praise His Name.

Vamp 1:
Solo Spoken:
1. Let us keep those hands together
How many of you came to lift up the name of Jesus?

2. Is He worthy? Is He worthy?
All right, come on…

Solo #1: Chorus:
Lift Him up Lift Him up
Lift Him up Lift Him up
Lift Him up Lift Him up
Lift Him up Lift Him up
Sopranos: Higher & higher Lift Him up
For all Lift Him up
Men to see Lift Him up
He said I’ll draw Lift Him up
All men to me Lift Him up

Vamp 2:

Solo #2: Chorus
He is Lift Him up
Jehovah Jireh Lift Him up
He is Lift Him up
Jehovah Nisi Lift Him up
I got to lift Him Lift Him up
I gonna give Him glory Lift Him up
He’s been good to me Lift Him up
Aw, oh lift Him & Lift Him up
He’s worthy Lift Him up
of power & praise Lift Him up
Come on & clap those hands Lift Him up
Cause He’s worthy Lift Him up
You better lift him up Lift Him up
Higher Lift Him up
Higher Lift Him up
Higher Lift Him up
I came to Jesus Lift Him up
To praise His name Lift Him up
I will lift Him Lift Him up
I will lift Him & Lift Him up
I found in Him Lift Him up
A resting place Lift Him up
My Jesus Lift Him up
Is My Savior Lift Him up
I will bless Him Lift Him up
I will exalt Him Lift Him up
I will raise Him Lift Him up
I will praise Him Lift Him up
I got worship Lift Him up
Cause He is God Lift Him up
Cause He is God Lift Him up
He is God Lift Him up
Yeah……. Lift Him up
ENDING:
Let everything that hath breath praise Him,
Let everything that hath breath praise Him,
Let everything that hath breath
Praise the Lord

Saturday, May 5, 2012

TOP TEN CONSPIRACIES

Princess Diana's funeralCredit: Pubic Domain, Paddy Briggs
CONSPIRACY 2
Princess Diana's Murder
Within hours of Princess Diana's death on Aug. 31, 1997, in a Paris highway tunnel, conspiracy theories swirled. As was the case with the death of John F. Kennedy, the idea that such a beloved and high-profile figure could be killed so suddenly was a shock. This was especially true of Princess Diana; royalty die of old age, political intrigue, or eating too much rich food; they don't get killed by a common drunk driver. Unlike many conspiracy theories, though, this one had a billionaire promoting it: Mohamed Al-Fayed, the father of Dodi Al-Fayed, who was killed along with Diana. Al-Fayed claims that the accident was in fact an assassination by British intelligence agencies, at the request of the Royal Family. Al-Fayed's claims were examined and dismissed as baseless by a 2006 inquiry; the following year, at Diana's inquest, the coroner stated that "The conspiracy theory advanced by Mohamed Al Fayed has been minutely examined and shown to be without any substance." On April 7 of this year, the coroner's jury concluded that Diana and Al-Fayed were unlawfully killed due to negligence by their drunken chauffer and pursuing paparazzi.

TOP TEN CONSPIRACIES

WTC 9/11 AttackCredit: Public domain image
CONSPIRACY 1
The 9/11 Conspiracies
The evidence is overwhelming that the terrorist attacks of Sept. 11, 2001, were indeed the result of a conspiracy. There's no doubt about it: A close (or even cursory) look at the evidence makes it clear that it was carefully planned and executed by conspirators. The question, of course, is who those conspirators were. Osama bin Laden and the crew of (mostly Saudi) hijackers were part of the conspiracy, but what about President Bush and Vice-President Dick Cheney? Did top Bush advisors, including Paul Wolfowitz and Donald Rumsfeld, either collaborate with bin Laden, or intentionally allow the attacks to happen? Put another way, was it an inside job? Conspiracy theorists believe so, and point to a catalog of supposed inconsistencies in the "official version" of the attacks. Many of the technical conspiracy claims were debunked by Popular Mechanics magazine in March 2005, while other claims are refuted by simple logic: If a hijacked airplane did not crash into the Pentagon, as is often claimed, then where is Flight 77 and its passengers? Are they with the Roswell aliens at Hangar 18? In many conspiracy theories, bureaucratic incompetence is often mistaken for conspiracy. Our government is so efficient, knowledgeable, and capable—so the reasoning goes—that it could not possibly have botched the job so badly in detecting the plot ahead of time or responding to the attacks. I find that hard to believe.

FIVE CRAZY MYTHS ABOUT THE MOON


The biggest full moon of the year will rise Saturday (May 5) as Earth's only satellite swings into its perigee, or closest approach to Earth. This so-called "supermoon" will appear extra big and extra bright.
In honor of the moon's big show, we're dispelling a few myths about the Earth's rocky satellite. Read on for the real scoop on the moon's role in madness, the history of the moon landing, and how that whole green cheese thing got started.

Myth 1: The Moon Makes Us Crazy
The word lunacy traces its roots to the word "lunar," and plenty of people, from nurses to police officers, will tell you that things get wild around the full moon.
But this non-supernatural equivalent of the werewolf myth doesn't hold water. A 1985 review of the literature on the timing of mental illness and the moon found that the folklore that links the full moon with mental breakdowns, criminal behavior and other disturbances has no basis in scientific data. Nor has research turned up a link between the moon's phase and surgery outcomes — though pets are more likely to need a trip to the emergency room during a full moon, likely because owners keep them out and about later on nights when the moon brightens up the sky.

Myth 2: The Supermoon Can Cause Disasters
The reason we have supermoons is because the moon's orbit is not perfectly circular. When it swings closer to Earth on its elliptical path, the moon does exert a bit more of a gravitational pull on our planet. But it's nothing Earth can't handle.
Tidal forces around the world will be particularly high and low, with the moon exerting 42 percent more force at its closest point to Earth than it does at its farthest, according to Joe Rao, SPACE.com's skywatching columnist. This extra force doesn't have an appreciable effect on disasters such as earthquakes and tsunamis, however.
"A lot of studies have been done on this kind of thing by USGS scientists and others," John Bellini, a geophysicist at the U.S. Geological Survey told LiveScience's sister site Life's Little Mysteries. "They haven't found anything significant at all."

Myth 3: The Moon Landing Was a Hoax
We've got video. We've got rocks. We've got a dozen astronauts who have proudly returned to Earth to recall walking on our great satellite. But conspiracy theories claiming that the moon landing was faked just won't die. [Top 10 Conspiracy Theories]
These moon hoax theories are multitudinous and varied, ranging from claims that there was no dust on the Apollo 11 Lander footpads so the Lander must have never left a secret soundstage (In fact, dust on the moon doesn't hang in the air as it does on Earth due to a lack of gravity, so dust kicked up by the landing would have been hurled away from the Lander) to theories about faked rock specimens (In reality, moon rocks have been researched by NASA scientists and independent researchers alike. They're unlike any Earth rocks, lacking water-bearing minerals and bearing tiny meteoroid craters from the specks of dust that would have been burned up in Earth's atmosphere but which landed on the surface of the airless moon.)
As thinly sourced as it is, the hoax theories can be frustrating to those who risked their lives to get to the moon. In 2002, Buzz Aldrin, one of the members of the original 1969 Apollo 11 mission, was dogged by conspiracy theorist Bart Sibrel at an event. When Sibrel blocked Aldrin's path and called him a "coward" and a "liar," the then-72-year-old astronaut punched Sibrel in the face.

Myth 4: The Moon Is Made of Green Cheese
The myth to dispel here isn't so much about the moon's makeup — definitely not cheese — but rather the idea that anyone ever believed the old "the moon is green cheese" canard at all. In fact, the cheese myth seemed to have started with a sardonic little couplet by English poet John Heywood (1497-1580), who wrote, "Ye set circumquaques to make me beleue/ Or thinke, that the moone is made of gréene chéese." [10 Beasts and Dragons: How Reality Made Myth]
In other words, the first known mention of the moon being green cheese was actually mocking the idea that anyone would believe that the moon was green cheese. Heywood apparently underestimated early 20th-century children: A 1902 study published in the American Journal of Psychology surveyed young children about their beliefs about the moon and found that the most common explanation for what it might be made of was cheese. Other theories included rags, God, yellow paper and "dead people who join hands in a circle of light."

Myth 5: Cold War-Era America Was Moon-Crazy
Today, Americans remember the 1950s and 1960s-era space race as a time when NASA had broad public support. In fact, levels of support for human lunar exploration were close to what is seen today.
During NASA's Apollo program, 45 percent to 60 percent of Americans believed the U.S. was spending too much money on spaceflight, according to a 2003 paper published in the journal Space Policy. Polls in the 1960s ranked spaceflight near the top of the list of programs that Americans wanted cut, study researcher and Smithsonian space historian Roger Launius found.
"[T]he public was never enthusiastic about human lunar exploration, and especially about the costs associated with it," Launius wrote. The enthusiasm it had "waned over time," he continued, "until by the end of the Apollo program in December 1972 one has the image of the program as something akin to a limping marathoner straining with every muscle to reach the finish line before collapsing."
 
Copyright 2012 LiveScience, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

 

Copyright @ 2013 TECMIE iCENTER.

.