Is only a routine maintenance.

W63X5ZGM497P
READ MORE -

Facebook Threat!! Use your Facebook safely

You and just about everyone else, it seems, are spending more and more time on Facebook and Twitter, updating statuses and checking friends' tweets. That's all well and good, of course, but the amount of personal information that all of you share in real time, and the level of trust implicit with the social networking sites, do pose particular security and privacy problems.


A recent study from Sophos found that Facebook users reveal a lot of personal information to new friends, including ones they really don't even know or have never met. Using fake profiles, Sophos sent out friend requests to 100 random Facebook users, and more than 40 percent blindly accepted, giving the company access to birth dates, e-mail addresses, phone number and addresses--private information strangers shouldn't have. 


The openness of Twitter--anyone can follow anyone else, and posts are indexed in search engines--makes it a nirvana for spammers. Kaspersky says there are nearly 500,000 new unique URLs that appear in Twitter posts daily, and of those, anywhere between 100 and 1,000 are malware attacks.


Here's a look at some of the specific threats users of the sites face and what they can do about it.


FACEBOOK



A rogue app that appeared early in the year sent notifications to Facebook users reporting they were violating terms of service and offering a link that lead to an application called "facebook -- closing down!" which then spammed all the friends of affected users. (Credit: Trend Micro)


Problems: Malware, account hijacking, phishing, and social engineering


The biggest malware risk is Koobface, (an anagram of Facebook), which is a worm that targets social networking sites and affects Windows-based computers. Once a computer is infected, it hijacks the Facebook account and sends messages to other friends of the victim, enticing them to click on a link. The link redirects to a Web site where they are prompted to download software ostensibly to watch a video. However, there is no video; only malware that infects the system, blocks access to security sites, and can be used to steal sensitive information from the computer, such as credit card numbers. Infected machines can then be used to spread the worm to others on Facebook, send spam and distribute fake antivirus alerts, said Rik Ferguson, a security researcher at Trend Micro. Koobface now can automatically create new profiles using infected machines, he said. 


Facebook accounts can be hijacked in several ways. A brute-force attack can be used to guess passwords. Users can fall for phishing attacks by clicking on links in messages or e-mails purportedly coming from friends that redirect to a fake Facebook log-in page. Or malware such as Koobface can steal passwords.


Social engineering is a huge problem for social networks because the trust that users have for messages and posts from friends can be easily exploited by scammers. Hijacked accounts are used to send everything from spam touting weight loss plans to links that install malware and steal passwords to fake emergency messages saying a friend is stranded in another country and needs someone to send money. Scammers are also sending e-mails that look like they come from Facebook and include an attachment that contains a Trojan. 


Solutions: Use antivirus and anti-malware software and keep it up-to-date. Install security updates for operating system and other software. Use software like AVG Linkscanner or McAfee Site Adviser to protect against phishing and malware attacks. Become a fan of the Facebook Security page, which has posts related to all sorts of security issues, tips, resources and other information. If you think you've been infected with Koobface or other malware you should reset your password and notify friends who may have been affected. 


Use an up-to-date browser that features an antiphishing black list, such as Firefox 3.0.10 or Internet Explorer 8. Be aware of where you enter your password. Check to see that you are logging in from a legitimate Facebook page with the Facebook.com domain. Be wary of unusual stories or offers that are too good to be true. Verify information with sources directly. Be cautious of any message, post or link that looks suspicious, requires an additional log-in or asks you to download or upgrade software. If a link seems odd or lacks context, don't click on it. Don't click on links or open attachments in suspicious e-mails. You can add a security question from the "Account Settings" page if you would like an additional layer of protection. 


Problem: Rogue applications 


Facebook doesn't vet every app that appears on the site, which means there is a risk that some apps will have bugs in them or will violate Facebook's privacy policies. Facebook has proven diligent in removing rogue and problem apps quickly when it is notified, but unlike iPhone apps, pretty much anyone can write a Facebook app. "Because the code is not always of professional standard or hosted or audited by Facebook, we've seen innocent apps compromised externally and used to deliver malware, such as fake antivirus," Ferguson said. One rogue app that appeared early in the year sent notifications to Facebook users reporting them in violation of terms of service and offering a link that lead to an application called "facebook -- closing down!" which then spammed all the friends of affected users, according to Trend Micro


Solution: See solutions above, and be cautious about adding applications. Research the developers and perform Web searches to see if anyone has complained about the app. And ask yourself, what value does the app provide? Do I really need to play zombie?


Problem: Privacy leaks due to user error 


Because people control who they are friends with on Facebook it is easy for users to have a false sense of security about the privacy of their data and activities on the site. Social engineering attacks, lax security practices by users like using weak passwords and design or implementation problems with the site itself can undermine the privacy protections users rely on. Users who fall for phishing scams and get their accounts hijacked have everything in their account exposed to strangers who can then use the different types of data for identity fraud or to target the victim's friends with social engineering attacks. 


Solution: See solutions above. Also, use unique logins and passwords for each Web site you access. Use strong passwords, change them often and don't share them with anyone.



These instructions explain how to keep most people from viewing your friends list on Facebook.

(Credit: CNET)
 
Problem: Privacy leaks due to design or implementation issues


Privacy advocates contend that Facebook's lenient apps approval process, privacy policies and confusing privacy settings put users at risk. Two weeks ago, Facebook asked users to configure their privacy settings. The options were confusing and many people were inclined to just keep the default settings, which are set to make the data visible to the Web rather than opting to use the old settings established by the user. Screenshots and descriptions are detailed on this photo gallery


Many people have complained that it is difficult to figure out how to change the privacy settings, that they are not intuitive and that there doesn't seem to be one central place for that. And using Facebook Connect with outside apps, like the iPhone app Foursquare, can expose more information than a user expects to share. The new privacy changes at Facebook have prompted the Electronic Privacy Information Center to ask the Federal Trade Commission to investigate


Facebook encourages people to share their full names, date of birth, home town and other information, all pieces of information that are commonly used in identity fraud. Scammers on underground sites even refer to Facebook as a "free date-of-birth look up service," according to Ferguson. People don't realize that their profile information can be accessed by total strangers who happen to be in the same groups or networks unless they specifically change the settings. People who don't trust random apps--which in general have access to profile information even if it isn't necessary to the function of the app--don't realize that the apps their friends are using also have access to their data. "Friends apps can access most of your profile, interests and groups. There is no way to prevent them from accessing your name, profile, photo, town and gender," said Joseph Bonneau, a PhD candidate in security at the University of Cambridge. In response to user feedback, Facebook made a change that allows users to hide their friend lists from everyone but their friends, a Facebook spokesman said. 


Solution: CNET has a tutorial on how to hide your Facebook friends list by clicking on the pencil in the friends box on your profile. Detailed instructions and tips on dealing with Facebook privacy settings are available on the DotRights.org site and on the All Facebook blog. Facebook also has a blog post about the privacy changes. 


Problem: Privacy leaks related to marketing


The relationship between the apps and advertisers can also cause problems. Adding an app allows the app to show ads inside the Facebook domain, and that can leak a user's profile information to the advertiser, said Peter Eckersley, a staff technologist at the Electronic Frontier Foundation. Meanwhile, cookies and other browsing tracking technology combined with data from social networks can be used by marketers to identify users for targeted advertising and other purposes, Eckersley said, providing details in a blog post on different ways data can be leaked from social networks to third-party tracking firms. Once marketers know a specific person's user name, they can use that identifier in the URL to get to a user's public profile page, according to Eckersley. "They can create a social graph of your date of birth, city, employment, relationship status, all uniquely codified in a way that can be automatically sucked into a database," he said. 


Solution: Pick a good cookie policy for the browser, such as manually approving all cookies or only keeping cookies until the browser is closed. Disable Flash cookies. Use Firefox extensions such as RequestPolicy and NoScript to control when third-party sites can include content or run code in the browser page. Use the Targeted Advertising Cookie Opt-Out plugin or AdBlock Plus to block ads. To hide your IP address and other browser characteristics, use Tor via Torbutton


Problem: Information used to suppress dissent and target political activists


As with e-mail, blog postings and other public expressions of dissent, Facebook and Twitter have been used by governments to target protesters. The Wall Street Journal reported earlier this month that family members of Iranian Americans had been arrested or questioned because of anti-Iranian government posts on Facebook by members outside the country. In other instances, Iranians living abroad were forced to log into their Facebook accounts or reveal passwords to government officials as they arrived at the Tehran airport and some even had their passports confiscated because of their political posts. In the U.S., the EFF says, officials have taken actions against U.S. citizens based on information discovered on their social networks; the group has sued the CIA and other agencies for allegedly refusing to release information about how they are using such sites in surveillance and investigations.


"Basically, every time you post something to Facebook you should assume that the whole world will know what you've posted, your family, employer, the government, people you don't trust," Eckersley said. 


Solution: Think carefully about what information you want to share about yourself and consider only posting information you would want to let the general public see. 


So what do you think?? Is it still safe to use social media networks??


#Article shown above is copyrighted of their respective owners
www.news.cnet.com
READ MORE - Facebook Threat!! Use your Facebook safely

How to Managing Link on your Blogroll

Follow this link for the tutorial
How to Managing Link on your Blogroll
READ MORE - How to Managing Link on your Blogroll

How to use Blogger backlink

Follow this link for the tutorial
How to use Blogger backlink
READ MORE - How to use Blogger backlink

How to create a graphical header for your blog

Follow this link for the tutorial
How to create a graphical header for your blog
READ MORE - How to create a graphical header for your blog

Tips to save a web page in full-format-view on Mozilla Firefox

When we want to save a whole web page (not the entire content of the website), including the drawings and also keep the format or structure, usually can choose the Web option Complete the store. But despite being stored, this often can not be opened offline and its structure becomes chaotic.

Alternatively we can save the whole of a page with the format MHT (MHTML) and also Mozilla Archive Format (MAFF).

Saving a web page as a whole is sometimes very necessary, like for the offlline reopened, for reference or for various other purposes. In addition, the website usually read the whole page with pictures and with a view like the original would be more comfortable than just reading it in HTML format.

For users of Internet Explorer, since version 5 and above, users can save a whole web page, by selecting "Save as, then the option save as type select Web Archive, single file (. Mht). In this way a web page will be saved intact, including images and composition.

Such a way can also be done for the Opera web browser users (since Opera 9). so that a web page will be stored in one file only (including images and other components). This file is usually berekstensi. Mht or. Mhtml.

But because the format MHT / MHTML this menpunyai a clear standard, sometimes files are stored in one of the web browser could not be opened with other web browsers. And also not much that supports this format.
Mozilla Firefox

For Firefox users, with features of our luggage could not save a whole web page in a file such as Internet Explorer or Opera. But we can use additional tools (Add-on) whose name Mozilla Archive Format.

With Mozilla Archive Format, we can save a whole web page in a file only. We can choose 2 of the available formats, namely:

    
* MAFF (Mozilla Archive Format files). Web page (html, images, javascript, css) will be stored in one file only, which berekstensi. Maff.
    
* MHTML (Internet Explorer's MHT). With this tool is also the option to save web pages in a format. Mht or. Mhtml.

MAFF has advantages compared to MHTML, such as smaller size, can store additional data like, and maff files can be opened with programs like winzip, winrar, 7zip or other kompressi programs and files can be viewed individually.
Use Mozilla Archive Format

To use this add-on, which obviously in the computer must have Mozilla Firefox web browser. Next is a download add-on from http://maf.mozdev.org/ address. Add-on This is a file that has the extension. Xpi, such as MAF-0.17.2.0-fx.xpi (size approximately 356 KB). After the files MAF-0.17.2.0-fx.xpi downloaded, then added to the firefox, by the way:

   
1. Run Firefox
   
2. Click the File menu> Open File (from browser Firefox)
   
3. Look for the xpi file (MAF-0.17.2.0-fx.xpi), then after that click Open, which then will appear the window "Software Installation"


      
install-add-on
   
4. Click the install button, to install (added) add-on to firefox
   
5. When finished, then restart firefox before use

If already installed, then in the menu Add-ons (Tools> Add-ons) will be seen the addition of Mozilla Archive Format.

firefox-add-on

Furthermore, to save a whole page, via Firefox, select Save Page as the menu, then the option "Save as type, select Web Archive, MAFF zipped. Or we can choose to save in the format MHT / MHTML.

save-as-type

After the files are stored (in the format. Maff), then we can open the firefox with the format as the original intact. In order files. Maff or. Mhtml automatically opened with Firefox, it is set through the Options menu in the list above Add-Ons, and then open the File Associations and click Create association for. Maff extension.



# Article shown above is copyrighted of their respective owner


READ MORE - Tips to save a web page in full-format-view on Mozilla Firefox

Twitter Threat!! Use Twitter safely!

This screen shot shows a Koobface attack message on a Twitter page. (Credit: Trend Micro)
 
Twitter has many of the same malware, phishing, hijacking and social engineering issues that Facebook has, and the solutions for those problems would be the same. Because users don't provide much personal information to Twitter, and can even create accounts using all fake information, and because anyone can follow anyone else, there aren't the same issues with privacy, either. But that makes life easy for spammers. 


Security does seem to be a worrisome thing with Twitter. The site has had several serious problems from employee accounts getting compromised. In January, someone hacked into the Twitter internal network -- possibly by guessing the password -- and gained access to the Twitter accounts of President Obama, CNN anchor Rick Sanchez, and 31 other high-profile Twitterers. In May, someone broke into Twitter's network and gained access to 10 accounts, which appeared to include Britney Spears and Ashton Kutcher. In that breach, a hacker was able to gain access to a Twitter employee's Yahoo account through the password recovery system and from there get information from other sites, including access to the employee's Twitter account. And last week, the legitimate account of a Twitter employee was used to hijack the site and redirect visitors to an external page displaying a banner for the "Iranian Cyber Army."


Meanwhile, Twitter was crippled (and Facebook and other sites also affected) by a rare politically motivated denial-of-service attack targeting one user in August. However, that incident reflects more on Twitter's ability to keep the site up in the face of an attack and accessibility than it does about security risks to users. 


Twitter users are susceptible to getting their accounts hijacked, and the site has been targeted by clickjacking pranks. In these social engineering attacks, users were encouraged to click on links that distributed the original tweet to all of the Twitter user's followers.


Users with large numbers of followers have an added responsibility to be careful, particularly when setting accounts to automatically post items from news feeds. A malicious post on an unmoderated news feed that venture capitalist Guy Kawasaki was re-tweeting distributed a Trojan to more than 139,000 followers in June


Kaspersky offers a Krab Krawler tool that analyzes tweets as they get posted on Twitter and blocks any malware associated with them. Trend Micro has technology that monitors Twitter posts for malicious URLs, as well as looks for attack patterns in the posts, such as use of popular terms to indirectly lead people to malicious links. And Finjan offers a free browser plug-in dubbed SecureTweets that warns users when they encounter a malicious URL in Twitter, as well as Blogger, Gmail, Google and a host of other popular sites. To keep up with security issues on Twitter follow Twitter's Spam Watch account. 


Social networks are also susceptible to other serious security problems that can hit any type of Web site. For instance, last week passwords of 32 million stored in plain text on the RockYou site were exposed by a SQL injection attack, according to security firm Imperva. Because the passwords are used on other affiliate sites to the social networking application maker, the breach jeopardized other accounts, like Gmail, Hotmail, and Yahoo. 


So what do you think?? Is it still safe to use social media networks??


#Article shown above is copyrighted of their respective owners
READ MORE - Twitter Threat!! Use Twitter safely!

Top 10 Tips for Buying the Right Camera

You're ready to buy a camera. You've got your money in hand and you're ready to start shopping. Before going off to purchase the most gleaming model you can afford, prepare yourself with the following essential buying tips.



Know yourself and why you need a camera. Consider your capabilities and interest in photography, and how a digital camera fits into your lifestyle. Different models are better suited for different situations. See if you might fit into one of the three photographer-types listed below:


Novice User: Are you new to the world of digital photography? Many low-cost point-and-shoot digital cameras include a range of standard features that are simple to learn and operate, making them an ideal choice for the beginning or casual photographer.


Intermediate Photographer: If you take a wider array of photographs -- from quick snapshots to vacation photos to sporting events -- you'll need a versatile, full-featured camera that can handle a range of zoom scenarios, photo subjects, lighting conditions, and so on. 


Serious Amateur: Are you an experienced photographer that is prepared to pay a higher price for the features, flexibility, and control available only with a DSLR (digital single lens reflex) camera with interchangeable lenses?


Determine your ideal camera type. Make sure you understand the relative strengths and limitations of point-and-shoot and DSLR cameras, and which is best suited for the photos you want to take. Although there are areas where the lines between point-and-shoots and DSLRs are blurring, the two classes of camera still have their own distinctive features that make them well-suited for different situations. Which camera is best for you can be as simple as needing the image quality of a DSLR or the convenience of a point-and-shoot, or it can be a more involved decision based on your experience level, the type of photos you take, and your desire to use manual settings.  




Get a feel for the camera. Hold the camera and take a few photos with it. You'll get more enjoyment from a camera and use it more often if it fits comfortably in your hand and the controls are easy to use.


Look beyond the megapixels. For high-quality photos, consider the size and type of the camera's image sensor.


Check out the zoom and focus features. Higher power zoom lets you get closer to the action, and optical zoom is more important than digital zoom because it doesn't reduce image quality. Auto focus features also are important, but a camera with manual focus features can give you greater flexibility.


Help reduce the risks of blurry photos. Image stabilization is important for helping to reduce shaking and blurriness. Electronic image stabilization is a good start, while optical image stabilization is even better.


Low-light capabilities matter. How well your camera performs in low light matters as much as how well it takes photos in bright sunlight. Cameras that have high ISO sensitivity (ISO ratings 800 or higher) will be better able to capture properly exposed images with reduced blur in dimly lit situations.


Consider advanced features. Think about what additional technology features you want in your camera -- such as face detection or in-camera retouching -- to help you achieve better results and enhance your overall photography experience.


Accessorize in style. Know what accessories you would like to use and what other devices you want to connect to your camera, such as an HDTV to view your photos, in order to make sure it has the right inputs and outputs.


Be sure to comparison shop. Before deciding on a specific model, look at the models above and below it. Sometimes you can get amazing features for only a small price difference.
After you have decided which camera is the best one for you, further your education and love of photography by learning more about photo restoration basics or how to use Adobe Photoshop CS2, and much more at Sony’s Digital Imaging 101. (Sony)



So ready to grab some camera?? Roll, Action!


#Article shown above is copyrigthed of their respective owner


READ MORE - Top 10 Tips for Buying the Right Camera

Changing Blogspot Header

Header on a website or blog is a unique identity, may be the same template but not with the header. Try to make different headers and interesting than others, because people who visit your blog will be the first to the top of this. There are few tips for you to change the identity of this blog, want to know?

Why change the header of this sort need? Because we use a free template free there may be other people who just use the template, then all the same people with easy ways to remember our blog?  "Say With Header". No need is too great, the important simple, unique, and classy. For you who are not proficient in matters of design, not to worry we can download the image header from the free sites. We just need to edit by adding your blog title text and description of your blog.

Okay before you download headers first change you there or here, do not worry it's free. When finished you choose, now you have to adjust to the size of the header on your blog. Finding it fairly easy way, you stay in the settings menu on blogger Layout> Edit HTML. Then look for the code # header-wrapper, let alone easy push F3 and the contents of the code in the find box. Sample size  header on this blog:

# header-wrapper (width: 973px; height: 150px; margin: 0px; padding: 0px; text-align: left; background: # ffffff; border-bottom: 1px solid # c0c0c0; border-top: 1px solid # c0c0c0;
)

In width: 973px means that this is the size of your blog header width is 973 pixels, and height: 150px height means the headers you 150 pixels. So you have to change the header you downloaded earlier to measure, how to live resize image with the help of software such as corel, photoshop, fireworks, etc..

If you've resize now add the title of your blog. If you are finished be sure to save your header files should use the format. Jpg as a result of this file pretty good quality and not too large file size, is to avoid loading the page you are heavy.  To upload a picture you'd go to the page layout.

Click edit in the header element you who have your blog title. Select the browse button menu image from your computer and just browse your header files. For the selection from the web used when you save the file hosting like photobucket, google picassa, you live to enter the url address where you save the image.

In there select the option button placement Instead of title and description, so the image you'll be covering the Title and Description Blog You, while "Behind title and description Title and Blog Description You will remain visible, and do not forget to check the check box Shrink to fit, this will shrink your image to fit the header.

Finally, click Save and view your work.

GOOD LUCK!


# This article is adapted from various source.
# Image shown above is copyrighted of their respective owner.

READ MORE - Changing Blogspot Header

Ansav, One of The Best Portable Anti-virus


Can not be denied again that the removable media like USB-Flash-Drive is one of the fastest spreading viruses media. The virus quickly move from one computer to another.

To avoid spreading the virus that the media these days increasingly worried about, like a desktop or laptop, removable media like USB-Flash-Drive also require protection from virus attacks, in addition to protecting data stored therein.

Ansav Portable Anti-virus is one of the appropriate solution. Lightweight, fast, requires no installation, yet powerful, and it's free. With the additional plugin options in it, make portable anti-virus is more and more to detect the virus and protect removable media like USB-Flash-Drive.



Ansav Portable Anti-virus is an application that runs on Windows XP and was made especially to handle various mallware like virus, Trojan and Spyware. This is not a commercial Antivirus, Ansav was only designed as portable software and can be undertaken without needing the installation.


Ansav Portable Anti-virus is downloadable here, and here is the latest update. Later you can update automatically from the application.


For more info you can go to www.ansav.com 
 


READ MORE - Ansav, One of The Best Portable Anti-virus

YouTube Downloader-The best downloader for YouTube like website

This simple freeware application works pretty well, given how basic the interface is. It has two main features: to download FLV files from YouTube, and to convert them to most major formats. If there's a YouTube URL in your clipboard, it will automatically paste it for you when you click on the dialog box. From there, just hit OK and the downloading will commence. One more left-click is all it takes to load the file in the converter, which supports iPhone, iPod, PSP, cell phone, AVI, MP3, WMV, and Xvid. Surprisingly, there's also a basic video editor for cropping videos by time stamp. You can also cut out the sound when converting.


This is one of the lightest editors around, but the simplistic interface belies its functionality and it performs exactly as advertised. We'd like to see support in future editions for hunting down missing codecs, and version 2.1.5 and earlier won't work because of embed code changes on YouTube itself. Still, the YouTube Downloader is proof that not only is video-making accessible to everyone, so is video downloading and editing.


It's software that allows you to download videos from YouTube, including HD and HQ videos, and many others and convert them to other video formats. The program is easy to use, just specify the URL for the video you want to download and click the Ok. It also allows you to convert downloaded videos for iPod, iPhone, PSP, Cell Phone, Windows Media, XVid and MP3. Allows you to access YouTube videos for which you need to be 18+ years of age. Now, plays videos downloaded.

So want give it a try?? Here is the download site. 

#Article shown above is copyrighted of their respective owner
READ MORE - YouTube Downloader-The best downloader for YouTube like website

Is Avatar (the movie) looks good or terrible?


The film "Avatar" by director James Cameron is waiting for more people, bringing lots of praise when he premiered in London, Friday morning, WIT, which among others called it a wonderful film.


The epic story of 3D (three dimensional) film director's best-selling 1997 "Titanic" This is one of the most expensive movie ever made and marketed, with the funds spent 400 million dollars. This film will be played simultaneously across the world next week and stamped U.S. cinemas on 18 December.


UK's best-selling tabloid, The Sun, called the "Avatar" as the most fascinating films of this decade. "The scene at the end of the war half-length 20 minute truly amazing."


Empire magazine gave a full five stars to this movie, as she called it as a "working with a huge reward," for which new technologies have been easier for the director create.


Avatar the movie is practically fantastic. Imagine, director James Cameron's Avatar has worked on the idea since 1994. At that time, he is constrained visual effects if desperate refine this movie.
 
This Canadian director was willing to wait a dozen years to realize his dreams through this film Avatar. In 1997, Cameron made Titanic success. Now 12 years later he launched the technology-laden Avatar movie. No high-tech film with good story after the trilogy The Lord of the Ring by Peter Jackson.
 
Imagination is depicted in the film Avatar is so vast seemed endless. Cameron seems to want to bring in viewers like Pandora. The film, reportedly spent up to Rp 2.5 trillion, this is a very worthwhile to watch. Some observers and critics believe this film became a big movie and will be remembered for all time.
 
Besides this film also contains a moral message that is very consistent with what is happening in our world increasingly devastated by our own hands.


So what about you?? Agree or disagree?

READ MORE - Is Avatar (the movie) looks good or terrible?

Does 'Avatar' Contain Hidden Messages?

Since it opened last week, James Cameron's much-anticipated film "Avatar" has won praise from movie critics and been a juggernaut
at the box office. But some who have seen the film say that it contains hidden messages that are anti-war, pro-environment, and perhaps even racist.


For the benefit of those who haven't seen the film, a little nonspoiler background might be useful. The story is set in the year 2154 when Earth's inhabitants, having used up most of their natural resources through decades of living in excess, plan to use military force to conquer Pandora, a moon roughly the same size as Earth. Pandora, inhabited by a wise, peaceful, and nature-respecting people with blue skin called the Na'vi, is rich in a resource that the people of Earth desperately need.

The earthlings send in a crew of special-forces mercenaries armed with guns, bombs, and other sophisticated weaponry to attack and conquer the Na'vi (who some think resemble American Indians and Africans), despite the fact that they represent no direct threat to the inhabitants of Earth. Since humans can't breathe in Pandora's atmosphere, the military employs mind-controlled avatars that resemble the Na'vi in every way to venture out from their landing craft and explore the landscape. Sympathizing with the Na'vi after becoming acquainted with them and their customs, one of the human-controlled avatars becomes a turncoat and helps lead the people of Pandora in the defense of their homeland. 


Are you beginning to get a sense of why some viewers noticed what they believe are underlying messages in the film? 


Some prominent members of the media who screened the film certainly took note. In a glowing review for the Chicago Sun-Times, Roger Ebert noted that "Avatar" "has a flat-out Green and anti-war message" that is "predestined to launch a cult." Meanwhile Ben Hoyle, writing in the Times of London, noted that the film "contains heavy implicit criticism of America's conduct in the War on Terror." Further, Will Heaven of the Daily Telegraph said that the plot line involving people of color who wear "tribal" jewelry while sporting dreadlocked hair, being saved by a noble white man gave the film a "racist subtext" that he found "nauseatingly patronising."
But are these hidden messages really all that hidden? James Cameron himself hasn't been shy in publicly proclaiming the fact that he's an environmental activist who believes that humans and "industrial society" are "causing a global climate change" and "destroying species faster than we can classify them." In a recent interview with PBS' Tavis Smiley, Cameron admitted that he made "obvious" references in the film to Iraq, Vietnam and the American colonial period to emphasize the fact that humans have a "terrible history" of "entitlement" in which we "take what we need" from nature and indigenous peoples "and don't give back." 


Further, one of the film's stars Stephen Lang told CNN that he is "not surprised at all" that some people have taken note of the film's political messages, mainly because the central theme of humans "destroying" a "pristine world" out of "blindness and greed" is so "overt." 


Despite the obvious political undertones in "Avatar," at least one right-leaning critic doesn't think people who disagree with the film's ideology should totally dismiss it. In his review on the website Hot Air, Ed Morrissey writes, "Conservatives have more or less primed themselves to hate this film because of the presumed anti-war politics of the movie. It's there -- in fact, it's unmistakable -- but it's not as bad as one might presume." He goes on to note that "Avatar" is "entertaining" though "hardly a deep intellectual exercise." 


So what do you think? are you agree with that??


This article source is


READ MORE - Does 'Avatar' Contain Hidden Messages?

Contact Us

JS Building, Lot. 15
1203 Jackfru Blv.
East Comhum, PL.

Email address: fit2pagemail@gmail.com

This website is powered by blogger.com and best viewed in Mozila Firefox.
READ MORE - Contact Us

Your Ad Here