• Welcome to the American Nation News Website!

    Welcome to the ANN American Nation News website! The only place for American News, Weather, Sports Bisness, and much more all at your fingure tips! Look around, and get reading on the latest in news across the United States, and even around the world!
  • Enter your e-Mail address to follow the American Nation News and receive notifications of new posts by email.

    Join 3 other followers

  • ANN Menu

  • American Nation News is protect by CopyScape. Do not copy!

    Protected by Copyscape Originality Checker

Two Koreas ‘at a turning point’ says South president

South Korean President Lee Myung-bak said a window of opportunity to improve ties was open. The Korean peninsula is at a “turning point” and there are opportunities for change, South Korean President Lee Myung-bak said in a new year speech. He said Seoul would “respond strongly” if provoked by North Korea, with whom it remains technically at war. But he said that the biggest goal was stability, and that aid-for-disarmament talks could resume if Pyongyang halted its nuclear activities. On Friday, North Korea told the people to not enspect much change from the new leadership. The Country’s Defence Commishion told the citizens of the North to defend Kim Jong-un to the last man, and to give all that they can to defend the Leader of North Korea. Kim Jong-un has succeeded his father, Kim Jong-il, who died on 17 December at the age of 69. Kim Jong-il had ruled North Korea since the death of his father, Kim Il-sung, in 1994. The impoverished and isolated communist country faces ongoing food shortages. Funds are channelled to the military and North Korea has conducted two nuclear tests since 2006. Lee Myung-bak said that peace was his priority and that a “window of opportunity” had opened for better ties with the North. He says that their is alot of turning points allong the Korean peninsula, and a window of opertunity could be underway to connect with the North. In the last two years, ties between the two Koreas have been extremely tense. Mr Lee’s decision to link the provision of aid to North Korea to progress on nuclear disarmament has angered the North. South Korea also blames its northern neighbour for sinking its warship in March 2010, killing 46 sailors. Eight months later, North Korea shelled a Southern border island, killing four people. Kim Jong-un took over after the death of his father, Kim Jong-il, two weeks ago, South Korea however, will matain a State of National Security along the 38Th Paraele, should the North go on the Ofenceve, and attack the South again… Pyongyang denies any role in the first incident and says South Korea provoked the second. It has castigated the South for failing to send a formal delegation to pay respects to Kim Jong-il. In the New Year Message, the Defence Commity in the North maid an announcement to defend the New Leader, dispite if they have to become a human shield. “The whole party, the entire army and all the people should possess a firm conviction that they will become human bulwarks and human shields in defending Kim Jong-un unto death.” Kim Jong-un, meanwhile, spent New Year’s Day visiting a tank division, state media said. His father was regularly reported to have visited factories, military units and agricultural projects on inspection tours around the country. The outcome of this, is for the moment, unknown, but it is belived, that maybe with the new leadership, we might be able to go forth and have a Conection with the North, that we have waited for for many years.

No Damage Reported After 7.0 Magnitude Earthquake Hits Eastern Japan

A 7.0magnitude earth quake struck japan on Sunday leaving no apparent  damage. The quake struck near the island  of Torishima 370 miles away from Tokyo japan. Buildings were shaking but suffered no damage. Many trains had to be delayed fore safety checks. Power plants were not damaged including the power plant in northeast japan witch was hit in march of 2011, a local reporter said to ANN The earth quake on march 11 2011 left nearly 20,00 either dead ore missing. As safety Crews worked to enshure all was ok, they also check structers to enshure that their is no trace of dammage. If their is one crack in any of the structers of Japan, such as their large sky scrapers, could spell desaster as a resalt. One Crack left un-checked, could meen a collapse of the whole building if another quake hits. Its epicenter was about 230 miles below the sea, the Meterological Agency said. It did not generate a tsunami. Buildings in the Tokyo area shook, but no damage or injuries were reported.

Are you a programming freek?

Programming can be both challenging and fun. During this series of articles, we’ll focus on a tutorial on programming. This article is an introduction to a programming language called Hop, which is two years old. This programming language is going to be discontiniued, because a newer version will be released in February of this upcoming year. The Hop language and its IDE will be introduced, because it leads to this new programming language. Keep in mind, that a programming language is at least twelve years old, so Hop is very new, as we can tell. Stay tuned for more on Hop and its IDE, or Intebrated development environment. The textbook and some examples will be part of the series of articles. This article is intended for people learning programming, or, for programmers willing to learn a new language nd update his or her education in computer science.

The World’s Worst Viruses

Earthworms are a boon to the backyard gardener and healers still use leeches to thin a sick patient’s blood, but no good has ever come from a computer worm or virus. Computer viruses have become increasingly dangerous and quick-spreading in the last couple of years, wildly proliferating through cyberspace and causing billions of dollars in damage.

Some of the distinctions between different types of malicious code are now blurred, but the classic computer virus is a piece of sneaky code that tells your PC to do something that you usually wouldn’t want it to do. Without your knowledge, a virus could wipe out the programs and data on your hard drive or even let someone take over your machine remotely. A virus replicates by embedding itself into programs or system files.

Worms are another type of devious program that, today, typically spread via e-mail or Internet chat programs. With the help of unprotected users’ address books, worms such as Klez spread explosively–disrupting networks and businesses. The oldest worms didn’t change system files or obliterate data. But as worms got more sophisticated, the newer ones started to behave more like viruses, doing considerable damage. For example, Klez can delete files and create the mechanism to run itself on system startup.

A third general classification of malevolent code is the Trojan horse. This destructive program poses as an innocent application or file, such as a screen saver or photo. Unlike worms and viruses, Trojan horses don’t replicate.

Some viruses and worms won’t destroy your data, while others do tremendous damage. For example, the LoveLetter virus overwrote files and inserted viral code on hard drives around the globe two years ago.

“As far as what [virus writers] can do, the sky is the limit,” says April Goostree, virus manager for McAfee.com. “In the antivirus industry, we never say ‘never’ anymore. Because as soon as you do, you are going to be proven wrong. It’s anybody’s guess about what the next virus will do.”

Here’s a look at ten of the most malignant viruses and worms of all time.

10. Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included “Hi! How are you?” and “Hola como estas?” If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer’s hard drive with gibberish. Visit Symantec’s Security Response for instructions on how to remove Sircam.

9. Red Raider

Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers–mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks–flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site’s IP address to thwart the attack.

The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec’s Security Response for instructions on how to protect your system from Code Red.

8. Bad Benjamin

Benjamin–a new breed of worm–was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system’s network connection and would ultimately fill up a hard drive. Visit Symantec’s Security Response for instructions on how to remove Benjamin.

7. Numbing Nimda

Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec’s Security Response for the Nimda removal tool.

6. Tennis Anyone?

The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn’t cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users’ e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim’s Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec’s Security Response for instructions on how to remove Kournikova.

Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.

5. (Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.

4. Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user’s e-mail address book. Attached were files pulled at random from the infected PC’s hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec’s Security Response for instructions on how to remove Magistr.

3. Malevolent Melissa

The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user’s address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.

So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it’s another good example of a virus with multiple variants. Visit Symantec’s Security Response for instructions on how to remove Melissa.

2. Klez the Conquerer

The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn’t as destructive as other worms, but it is widespread, hard to exterminate–and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail–regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim’s e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec’s Security Response for instructions on how to remove Klez.

1. Love Hurts

LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook’s address book entries. The mail included an executable file attachment with the e-mail subject line, “ILOVEYOU.” The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec’s Security Response for instructions on how to remove LoveLetter

The Troops are comming home! Their Comming Home! :D

The words we have all waited for over eight years, is now true.
As the U.S. pulls out and sighs of troops returning are starting to amerge, we all can’t but wonder. Whats next?
Well, as the possiblity of Iran being close to having a Neucliar Weapon, many start to wonder what Iran is doing with their stock of Atomic weapons. Well, as the overwelming joy of Sailors, Soldiers, and Poilets from the war start making their way home, many start plaining for celabration in the streets, and to welcome home the returning Soldiers.
Sargent Prickel, a member of the U.S. Army Reserves, has maid several trips over to the Middle East, and was at times on the air, for Armed Forces Radio. the young Sargent, who recently visited the Indiana School for the Blind and Visually Impaired, was on the air, when Osoma Bin. Lodan was reported killed by Seal Team Six.
Sense he was the only one on the air, and non of the big shots where in yet, he desided to go forth and make the report.
He learned it from the TV info from the United States, and he and his follow Armed Forces Radio buddies, went forth to make the call.
Sargent Prickel has returned recently after that day in history. He says he enjoyed the Army life, but nuthing beats home.

Currently, their is well over 20,000 still in the Middle East, still walking on the grounds and patrolling the area, but by the preset date of December of 2012, wich is the date the last of our American boys should come home, we should as of then on, be no longer involved in the Middleastern Conflict.
With the return of our Men & women in uniform, we should start to think of the main consern.
PTSD, or Post Tramatic Stress Disorder, will be a great difficulity in the Uniformed Men & Women who are returning. Many suffer with it after a voilent attack, or even having to kill another man.
Retired Airforce Sargent, Romono, who has served in the Vietnam conflict, talked about it with students at the Indiana Blind School for a History class.
He gave detail of his life in the Airforce, and how watching a C-130 flying at only 20 feet in the air, droping a load of cargo, and watching as one of his friends gets on a brightly coloared forklift, to go retrive the cargo while being fired at.
He suffers from PTSD, and his doughter, who is a braille teacher at the Blind School, recalls moments of watching her father suffer through the constent memorys of when he was in his 20’s in the middle of South East Asia.
These are the sitafects of PTSD, and the scars are deep when involved in a friend or sibleing being blowen up next to you in combat.
At times, the Indevidgiual will be voilent. Soldiers who have it, discribe it as being in fight mode 24/7, and the switch for turning it off is broke.
One soldier who lost his vision to an IED, told his family their better off without him, and talked about killing him self to keep others safe.
These people who are returning, will require to be monitored, and taken care of. Though suffering with PTSD, there still able to do daily activitys.
But, as one must question, is it possible we might get sucked back into the Middle Eastern war?
Well, not for shure, sense many Americans are fed up with the war over seas. Still, we must be aware that at anymoment someone at the top might second guess, and we could get thrown back like a fish out of a bass boat.
Though nuthing is absaluitley confermed, signs of the Sailers & soldiers returning are alover.
We can only hope that with the Medical condisions that many PTSD strucken troops can be helped by Medical profeshionals.
Americans have been in Iraq, Iran, and Afganstan for over eight years, and this sign of the many memn& Women returning back are great signs that we are now done with the war.
But, a great number of soldiers will commit seuacide once they return.
As many as 18 Vetrens will commit seuacide in as little as one day, and the list of reasons all points to breaking point of the mental health of the person.
as just recently a 27 year-old man is in jail in Newyork, after ploting to bomb New York. Mayor Bluberg addressed the issue last night, and their will be charges pending against him of acts of terrorism. The one thing we can live without, espeshally with the possiblity that he was gonna use the home maid explosave on American Troops.
But as we now look faword towards the Holoidays ahead, we start to think of the joy we will have when the troops come marching home of the plane onto safe terratory.
Atlast, we shail now rejoice with the grace of the conflict now comming to an end.
~Lincoln Ritchhart
CEO & Chairman
American nation News

Mom Charged with the Murder of her Son.

Affton, MO – A women in Missouri, Shelby Dasher, was charged today with the Murder of her 13 month old son. She originally claimed her son missing just a mere 16 hours before she was accused. A few residents walking their dog stumbled upon her sons body Tuesday near a cemetery. It was only about a mile from Shelby’s home. The County Prosecutor, Bob McCulloch, Said that Shelby admitted her doings to the police. Shelby said that she beat her son because he was crying and wouldn’t go back to sleep. “Raising children can be frustrating. There are a myriad of ways to handle that,” McCulloch said. “This isn’t one of them.”  Police Stated that Dasher reported her son missing from his crib once she had awoken after over sleeping.

More soon….

Computer programs that benifit the Blind & Visually Impaired

As many know, it is at times difficult to use a personal Computer, or to use computers in general.
The world of the sighted indavidual will use their eyes, and struggle if they have eye strain, or if the glair off the screen is too much.
While the Visually Impaired croud will use what are called, Screenreaders.
Now, a Screenreader is a downloadable program used to benifit the use of it by the Visually Impaired, by taking text on a computer, and transmitting it through Audio output, that will give the user a way to do book reports, Computer Programing anywhere from Computer Annalliest to programing for Nasa, the U.S. Military at Rollsroyce Jet Engens.
Thats right, I said the Corporation that maid the Rollsroyce Merllin Engen for the greatest World War II aircraft such as the Lancaster III, P-51 D Mustang, The P-38 Lighting, and the Spitfire.
But these Programs are also used in the Automoteave corporation aswell. as for other great jobs such as AT&T, Virision, Sprint, T-Mobile, Rebel, and many more.
The one most used at the Indianapolis Yellow Cab Company, in Indianapolis, Indiana is JAWS for Windows.
Now, Jaws stands for Job Access With Speech.
This screenreader if looking to use it, it able to do all programs on a computer for instents Microsoft Word, and the new Microsoft Word Publisher.
With it, you can make spread sheets, compose Computer Programs and write them, aswell as go on the web, and use programs such as Skype, or even Facebook & Twitter.
The bummer for this marvelous program is the price tag on it.
$1300 is the new price for it.
It use to be $1200 but with the Economey, it will not work for some people and their budgit.
Now, Jaws has a 40 Minute Demo you can use, but you have to restart the computer to use it after 40 Minutes.
You can find more Infomation by going to freedomscientific.com and or going to http://www.freedomscientific.com/products/fs/jaws-product-page.asp and get their quickly.
Now, as many know in the Blind & Visually Impaired world, people with site, or some sight who wish to understand more, go to info sorces such as Facebook, Twitter, Youtube, Wikipedia, Bing, Google, and Ask.com for info.
Well, we have a vidio for you all, and will talk about some of the basics of this ScreenReader.

Moving on, we now look at Window Eyes.
Window Eyes, a cheeper virision in some ways, is also widely used in and throughout the Blind community. It can preform all that Jaws can do, but does have quite the limmatations to go along with it.
We have a Preview of the Window Eyes 7.2 that was created by one of the good people at GW Micro INC.
In this Vidio, it will discuss some of the new feachures in Window Eyes, and along with Office 2010.

This poticular Screen is different from JAWS in price, and in other levels. But it has simmularitty between the two.
As shown, Window Eyes, is some what more difficult to use on sertin levels.
With motaple coursers, and different commands with the coursers, it can overlaps with confushion.
The user might have slight problems with the program due to the matter of Megabite space, aswell as some scripts for websites, Programs, and other things will not work with this softwear.
Its Price Tag of anywhere from $800 to $1000 is about a good few hundered dollars cheeper then JAWS, but the problem of cost will lingure, as will the problem of it not working with Skype on some Acasions, this Screen Reader is just one of the many avalable programs on market.
Now, with the Two main Programs that will put a bomb in your wallet, we now move to the last screenreader on our list for this Article of Science & Technology.
NVDA or Non Visual Desktop Access, is one of the many programs on market.
It is a freewear program, and is a walping $0.00 No charge program.
It was created in the Late 1990’s and has prospered sense with donations, and fundrasers. It though, does have a $100 price if you want extra, but eithor way, it is a program with no monthley or yearly payments. Just one and your ready to use the Computer you so greatly own.
It is well known for the voice it outputs from the computer.
The Distinctive british like voice that is the Defalt, is at times anoying, but a shure sign that NVDA is rolling along.
It though will work with Microsoft Works. but will not work with Microsoft Word Publisher.
The reason is mearly the lac of scripts provided to NVDA programs.
Though it will work with Microsoft Works, Skype, Notepad, The Internet, Macafee Internet Security, and with Microsoft Web Outlook, it is a drawback for not working with other programs such as Nortin Security, Adobie Installer, and can barly keep up with popular chatrooms such as xat.com and other popular chatroom providers.
It will work with Facebook, Twitter, WordPress, Blogger, Youtube, Google, Bing, Facebook Chat, Myspace, Myspace Chat, and many other great inventions of social media.
Though it can on a side note, kinda work with xat chatrooms, will involve lots of key command monouvering, aswell as refreshing the page if the text people type starts to not be detected by the program.
NVDA is though a great program, with a great history ahead.
With the current NVDA Virision 11.1 Installer & Portable, this Softwear program will sertenly be a great aid for thoese in need of a PC Program for visual dissabillity.
Now, like we all know in the visually Impaired, people want a vidio with more infomation, and a chance to see it in action. We have one on NVDA here below, from the Crossroads Rehabillitation Center in indianapolis, Indiana.

You can obtain these Screen readers online, or over the phone and have the softwear within 3 to 5 Bisness days. When Installing, a voice will come on to give you step by step installing instructions, so you can do it your self, if your visually Impaired.
The following are where you can Obtain the following Screenreaders, and more Infomation about them, and their use.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JAWS for Windows: http://www.freedomscientific.com/
Window Eyes: http://www.gwmicro.com/
NVDA: http://www.nvda-project.org/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We also have a list of Blind Organizations for you to exploar, and to even get an understanding of.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The ACB American Council for the Blind: http://www.acb.org/
The NFB National Federation of the Blind: http://www.nfb.org/
The AFB American Foundation for the Blind: http://www.afb.org/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You can go to the websites listed above, and get more Infomation about Blindness, the causes of it, Mobillity training Infomation, Membership, Infomation Technology, and talk with people who are visually Impaired and learn about the Visually Impaired world.
There are also Schools you can contact, such as the Blind Schools across the United States.
The Best in the Country, is in Vancoover, Washington State.
For more Infomation on Blind Schools in your State, contact your local NFB, ACB, or AFB Chapter in your Area for more details.
I too am Visually Impaired, and used NVDA for the work I do on this site, and to communacate with friends and Co Workers on Facebook.
The Program from my stand point is very helpful, and will benifit others who need it for their ongoing day to day perpous.
~Lincoln Ritchhart
CEO & Chairman
American Nation News