Wednesday, January 14, 2009

Auspicious dates for moving to new house/office in 2009

Here is the list of auspicious dates for moving to new house/office in year 2009, which is produced based on the Chinese almanac Tong Shu.



Bear in mind that although the Tong Shu is a compilation of Chinese astrology and calendaring studies gathering wisdom of thousands of years, we should use it wisely and rationally, but not be too superstitious on it.

Related articles:

Click here for auspicious dates for moving to new house/office in 2010.

Auspicious dates for signing contract, register for marriage, etc. in 2009

Here is the list of auspicious dates in year 2009 for signing contract, signing offer letter, register for marriage, receiving religious baptism, and other similar agreement-related activities. It is produced based on the Chinese almanac Tong Shu.



Note that 14 February 2009 which is the Saint Valentine's day, is also one of the auspicious dates in the list. Hence it is auspicious to register for marriage on that day, except for couple which either one of them was born in the year of Monkey.

Bear in mind that although the Tong Shu is a compilation of Chinese astrology and calendaring studies gathering wisdom of thousands of years, we should use it wisely and rationally, but not be too superstitious on it.

Related articles:

Click here for auspicious dates for signing contract, register for marriage, etc. in 2010.

Saturday, January 10, 2009

Fortinet outlined top 9 security trend predictions in 2009

Unified Threat Management provider and security appliance vendor Fortinet has outlined the Top 9 Security Trend Predictions in 2009 with the aim to help companies safeguard their networks by mounting a multi-layered, multi-vectored and comprehensive defense strategy.

They are:

  • More bang for the buck (security consolidation and integration)
  • Information security lockdown (database security)
  • Web 2.0 vulnerabilities multiply (corporate information leakage prevention)
  • Bigger pipes, faster speed: Letting in the good, bad and ugly (integrity of high-speed networks)
  • The next biggest threat to mobile security: 3G (virus infections and attacks to mobile devices)
  • More cash to flow in the digital underground (hacking for living)
  • Let the games begin (Trojans residing in online games)
  • Premeditated, targeted attacks on the rise (custom malware and scareware)
  • Law enforcement unite online

Click here to read the full story in original article.


Hint: Click on the "Older Posts" link to continue reading, or click here for a listing of all my past 3 months articles.