Translate

Wednesday, June 22, 2011

Five New Credit Card Company Tricks for 2011, to Get Your to Take Their Credit Card



Credit card offers are hitting mailboxes again. But before you respond to the temptation to load up your wallet with more plastic, you should know that a lot has changed over the past year either in response to the year-old CARD Act or the ongoing credit crunch. If you want to maintain access to plenty of credit and keep a great credit rating in this new environment, you’ll need to adapt. 


What do you need to do? There are five new tricks to getting and managing credit in 2011, says Virginia Sullivan, vice president of consumer education at Bills.com.


1. Use it or lose it.
Got credit cards gathering dust in a drawer? Issuers have become aggressive about closing accounts or cutting spending limits when a consumer isn’t using a card. That’s not a problem if the card that’s being canceled or cut is relatively new or has an insignificant credit limit. But if it’s your oldest card or the one that offers the most spending power, losing that card could not only limit your options, it could cut your credit score.

That’s because the nation’s most ubiquitous credit score — the FICO — gives you points for having a long history of paying your bills. Lose part of that history because your oldest card no longer shows up on your credit report, and it can trim your score. The less credit history you have, the more it hurts, in the long run.

In addition, you get points for having a low debt-to-available credit limit, so losing a high-limit card can have a big impact on your score. Consider: If you have a total of $1,000 of credit card debt outstanding spread among two credit cards, one with a $1,000 limit and one with a $10,000 limit, your debt to available credit limit is low — just 9%. That makes you look good in the FICO model. But if that $10,000 card is cancelled, your debt-to-available credit ratio soars to 100%. That makes you look overextended — even though your actual debt hasn’t changed a bit — and slams your credit score.

The trick here: Prioritize your cards. Use the ones you don’t want to lose.


2. No cash, no sale.
New credit regulations allow merchants to set a minimum purchase amount for credit card transactions. That’s mainly because merchants pay a fee to process your credit card swipe. The minimum purchase threshold can’t exceed $10 and does not apply to debit cards, says Sullivan.
Not all merchants set limits, but you should carry at least some cash in your wallet or a valid debit card just in case. Otherwise, you might have to buy a bunch of unneeded junk, just so you can charge that $1 bottle of water as you drive through the desert.


3. Card tinkering demands some shopping.
You may have done a great job of shopping for just the right cards — the ones with the best rates, fees or rewards — when you got them, but issuers have made vast changes in the past year that may make these cards less attractive. Almost every issuer has made some change from boosting interest rates and fees to revamping rewards programs. If you haven’t shopped your credit cards lately, now is the time to see if they still meet your needs. You can compare rates, fees and rewards programs at credit shopping sites like LowCards.com and CreditCards.com.


4. Forgetful can spell regretful.
The CARD Act prohibits issuers from raising your rates on an existing balance — unless you step out of line. Miss a few on-time payments and you not only get hit with a penalty fee — usually $25 — you could get hit with a penalty rate, too. That can raise the cost of paying off the card by hundreds, if not thousands, of dollars, Sullivan said. Make a point of always paying credit cards on time. If you’re forgetful, set up automatic payments.


5. Consider the horror of minimums.
Have you taken a close look at your credit card statements lately? If so, you’ve probably noticed the box that tells you just how long it will take to pay off this debt if you make only the minimum payment. If you’re a person who typically makes just minimum payments, this is a box worth studying.

Consider that it would take 138 months to pay off a 19% card by making only the minimum 3% — $90 — payment, according to CreditCards.com. That go-slow repayment cost you a stunning $2,782 in interest, which is almost as much as your original debt. But if you just boost your initial payment by $10 and pay $100 every month (even though the required minimum payment drops with your balance), you’ll pay off the loan in 42 months and save more than $1,600 in interest.
Want to do the math with your own balances? Check out the cool payoff calculators at CreditCards.com.


-Birdy

How To Make Your Own Products and Save Money


Ever wonder why there are so many dish soap commercials? Maybe the companies who make this stuff are trying to hide the fact it's really simple -- and cheap -- to make your own.  According to the latest government data, Americans spend an average of $659 a year on housekeeping supplies. The Bureau of Labor Statistics, which provides that figure, also says the average American earns about $787/week -- which means many people are spending most of (if not more than) a week's pay every year on dish soap, laundry detergent, and other cleaning products.

If that sounds crazy, here's a better idea: Make your own.

Recipes for cleaning products are as numerous as recipes for dinner. Here are just a few to help with dishes, clothes and more.

Dishwasher Detergent
Here's a simple recipe for dishwasher soap:
• 1 cup of borax
• 1 cup of baking soda
• ¼ cup of table salt
• 2 packets (half an ounce) of unsweetened lemon Kool-Aid


You can try to save even more by buying ingredients in bulk, but another idea is to find smaller and much cheaper boxes at your local dollar store: a good idea to since you'll want to try a small amount at first to see if you like the results. The amounts listed above are good for 16 loads -- one tablespoon each -- so even small batches will last a while.

Other recipes online vary: For example, we found one that suggested combining only borax and baking soda, 1 tablespoon each per load. Another suggested adding a little citrus essential oil to make it smell nice: We didn't try that one, however, because we had difficulty finding inexpensive citrus oil online. Then there's this recipe, which goes in a different direction altogether:

• 2 bars of shredded Octagon soap
• 1 cup of baking sod
• ¼ cup of washing soda
• ¼ cup of lemon juice


This one calls for melting the shredded soap in five quarts of water and then mixing in the other ingredients. If that sounds a little like the recipe for laundry detergent we wrote about last year, that's because it is.

Laundry Detergent
Speaking of laundry detergent, that's easy, too. You'll need:
• 4 cups of water
• ⅓ bar of cheap soap, grated
• ½ cup washing soda (not baking soda)
• ½ cup of Borax (20 Mule Team)
• 5-gallon bucket for mixing
• 3 gallons of water


First, mix the grated soap in a saucepan with 4 cups of water, and heat on low until the soap is completely dissolved. Add hot water/soap mixture to 3 gallons of water in the 5-gallon bucket, stir in the washing soda and Borax, and continue stirring until thickened. Let the mix sit for 24 hours, and voila! Homemade laundry detergent.

Other Cleaning Products
If you like the results of your homemade concoctions on clothes and dishes, why stop there? The next time you're at the store, instead of picking up a bottle of some expensive cleanser, grab these six items and make your own cleaning supplies:

Vinegar. It may smell a little weird, but vinegar can handle everything from dishes to laundry and even weeds. 

Baking soda. Eliminates odors and helps with stains, and also works as a natural method of pest control -- ants hate it.

Borax. This mineral salt beats bleach as a toilet cleaner and is also useful for scrubbing walls. And as you see in the recipes above, works with laundry, too.

Fels-Naptha soap. This one's actually made by one of those big cleaning companies: Dial. They recommend it for "pre-treating" stains. In other words, "use this in addition to a bunch of our other expensive products, like Purex!" But you can turn the tables by using it as part of a recipe for your own laundry detergent, and they can keep the Purex.

Rubbing alcohol. Works as a disinfectant and is also a great glass cleaner. It also gets grime off plastic and metal surfaces like patio furniture or bathroom fixtures.

Lemon juice. This cuts through dish grease and is an ingredient for homemade furniture polish -- but it's not the easiest thing to preserve long-term.


If making your own cleaning products sounds a little extreme, there are still simple ways to save. The best? Buying generics. And if you insist on using name brands, at least clip those coupons -- but only the ones worth your time.

-Birdy
___

MORE Free Stuff All Year Round!


On any given day, retailers may offer free, random giveaways to drive traffic to their stores. My trick to finding out current and upcoming freebies is to search on Google News. Type in “free coffee” or “free breakfast” or “free massage” and you’ll get several results. I just did for “free” and discovered free donuts at Dunkin Donuts that was on June 4, as part of National Donut Day. (However, the freebie catch is that you have to first buy a beverage).

Scheduled freebies can be tough to follow. Sometimes we don’t get enough advance notice, we forget or we run out of time. I was personally frustrated earlier this year when I didn’t make it in time to get a free scoop of ice cream from Ben & Jerry’s. I guess there’s always next year.


Free Facials
Before getting ready for a glam night or if you just want to give your face a clean start head to any Clarins store or mall counter and request a free 20-minute facial. You may need to make an appointment if you don’t want to wait, but walk-ins are welcome. 

Free Coffee 
Craving some java - and a quick lesson in online banking? ING Cafes across the country would love to treat you. Print and bring in this coupon to receive a free cup of coffee anytime during the day. The coupon says “2009,” but the company tells me it’s still valid this year.

Free Haircuts
Stylists-in-training at beauty schools usually offer free haircuts and styling's to the public to test-drive their new skills. On any given week you can usually get a new do at Regency Beauty Institute, which has schools across the country. Students sometimes bring in their friends or advertise that they need haircut volunteers on MySpace, according to Paul Kriloff, Regency’s vice president. Another way to discover free haircuts is to look up local beauty schools and institutes at www.beautyschoolsdirectory.com and call to find out when their next free sessions will be.

Free Concerts and Cultural Events
Target sponsors free events, concerts, and art exhibits throughout the year. Last summer Target sponsored free family nights at the Franklin Institute in Philadelphia and the San Diego Museum of Art, and performances at the Detroit Symphony Orchestra. The free events continue this year. They’re broken up by city/zip code so hop on to Target.com/arts to see what’s happening for free in your neighborhood. 

Free Yoga
Lululemon’s 100+ stores offer free weekly yoga or pilates classes. No need to call ahead or reserve; just show up. Call up your local Lululemon store to get that their specific class schedule. You can get contact info by visiting Lululemon.com and clicking on “store finder.” (By the way, yoga reduces work-related stress by 10 percent.)

Free Dessert on Your Birthday
Okay, these can only be free once a year … but it’s nice to know about them, right?
  • Cold Stone Creamery Birthday Club - free ice cream by signing up for their free My Coldstone Account.
  • Applebee’s - free dessert on your birthday when you sign up to receive their e-mails.
  • Quiznos - free cookie on your birthday, also when you sign up at their Web site.
Free Online Classes
Want to learn how to take great photos or build a basic web page? You can download free classes from the Hewlett Packard Learning Center

Or if you’re up for a bigger intellectual challenge, visit the Harvard or MIT Web sites to download free college-level lectures and classes. (MoneyWatch contributor Lynn O’Shaughnessy offers more ways to reduce your education costs.)

Free Odds and Ends
Skip the dumpster diving and search for free neighborhood giveaways at Freecycle.org, where you can search for free household giveaways - from art supplies to furniture, used video games and more. You can also post for things you want. 

And Finally: Free Movies
See what free movie screenings are happening in your town by visiting the Wild About Movies and FilmMetro Web sites. And learn about free summer movie days at your local box office. Regal cinemas run a Free Family Film Festival, screening free G- and PG-rated movies on weekday mornings. Schedule information is online; tickets are only available at select theaters’ box office on the day of the show.


Meanwhile, if you’d rather stay at home than go out, you can watch your flicks for free on your laptop by visiting Crackle.com, which has more than 100 titles from which to choose - including oldies-but-goodies Ghostbusters and The Karate Kid.

Enjoy!

-Birdy 


Tuesday, June 21, 2011

How to Beat Some Of The Sneaky Supermarket Tricks



Stores like Wegmans and Whole Foods are both managed and designed for the upscale consumer,” if you look at the stores, there’s a reason why there’s theatrical lighting, which is to make stuff look good. There’s a reason why there’s fresh produce at the door or a bakery, which is to make you start salivating. Studies over the past 20 years that tell us that somewhere north of 60% of what is bought in a supermarket isn’t on our list. The primary way in which someone can save money in their shopping is by planning.”

But I do make a list, I think to myself. I can picture it, scrawled on the back of my current article is: Frozen orange juice, coffee, milk and corn flakes.

Now that I think of it, my list is a set of unrelated items that don’t solve the what’s-for-dinner dilemma. They don’t translate into meals. OK, I need a better list. What other ways can I save money?

“Well you have to recognize there is no such thing as saving by putting something in your pantry, or in your refrigerator that you don’t need.”

And Why not?  If I see a brand of cereal on sale that I consume regularly, shouldn’t I stock up?”

No.  Because it's not on your list.  The fact that you’re saving 17 cents, or even a dollar, means you’re still spending $5 to get the box in the first place. If you don’t need it, don’t spend the money on it. The more you stock, the more you consume, and the more you stock, the more you waste. Organize your list, THEN stick to what’s on it.”

Empty the pantry: Check. Stick to the list. What else?
Recognize the highest margin area of the grocery store is the produce section, Americans tend to throw out somewhere in the neighborhood of 25% to 47% of the produce they buy, because they haven’t used it. Don’t buy a bag of onions; stick to what you actually need.”

You owe it to yourself to shop when you’re not tired, when you’re not hungry, and when you know the store isn’t going to be crowded.  As your discipline is shot when you’re tired or hungry.”

Buy for what you’re going to consume,  And Stick. To-The-List.”

You want good, simple advise to keep grocery bills down? Here's a few that you may have missed:
  • Start thinking ahead and design those menus. No one does it anymore? Get with the 21st century. Grab a free cooking app on your smart phone and pick a meal for each night of the week. Get the app to mail you the recipes. Don't have an app? Don't have a smart phone? Start
    developing an interest in cooking and write the list yourself. Basic laziness is no excuse.

  • Find a grocery store on the way home and visit it every day. Use the list of recipes to get what you need, when you need it.

  • Get a smaller fridge and cook smaller amounts. Stale leftovers get thrown away just as often as stale produce, and smell far worse. Better to read the recipe and make just enough for yourself.

  • If you're feeling industrious, go ahead and make lots, then FREEZE it. Stews, chili, lasagnas, shepherd's pie and a whole cavalcade of other meals keep well and near-indefinitely in the fridge. Cool the food down, portion it out and freeze it so that you can avoid grocery shopping later when you're tired and hungry and facing an empty larder. Hey, you'll even be able to entertain guests on the spin of a nickel since all it takes is whipping something out of the freezer and heating it up.

  • GET A SMALLER FRIDGE. Seriously people. Quit looking for something with a 1000 cubic foot capacity unless you're planning on laying down plastic sheets and getting all Dexter on people out there. You don't need a fridge that can hold an entire family of cows.

  • Coupons? Unless you're unemployed and have more time than money on your hands, grab the in-store coupon book and browse a little for anything that hits your "need it now" radar. Unless you're planning for the apocalypse you don't need to save yourself $52,000 a year in groceries since you'd have to spend about $520,000 to do that and THAT is a tricky supermarket trick to avoid.



    -Birdy



ATTENTION - SCAM


Fake check scams are the most pervasive fraud in America, hitting virtually every demographic group with some permutation of the same clever con, according to the National Consumer's League.

"Fake check scams are an equal opportunity fraud," says John Breyault, director of the National Consumers League Fraud Center. "Scam artists are savvy, networked and know every button to push to get consumers from all walks of life to fall for their schemes."

There are multiple permutations of the same con. But the basic way it works is this: You get a check for a relatively large amount of money and are asked to refund or pass on a portion of the amount to the sender or a third party. By the time you find out that the check is fake, your money is long gone.

The typical victim loses between $3,000 and $4,000 in the scam, says Susan Grant, director of consumer protection at the Consumer Federation of America. "Once you send money to a crook, it's almost impossible to get back."

Tragically, the scam works partly because of common misunderstandings about how banks clear checks. Financial institutions are required by federal law to give you credit for checks deposited in your account within a set number of days. The precise timing depends on whether the check issuer is local, national or international. Most consumers assume that when the bank makes the funds available, it has determined that the check is good. But that's not the case.

It can take weeks to discover a good forgery. At that point, the bank will reverse the credit it gave you for the fake check and you're on the hook for any checks you wrote against it. Worse, many banks will consider you the crook, close your account for "suspicious activity" and enter your name into a database that will make it more difficult to open another bank account, says Grant.

Consumer experts have been warning about this growing con for years. And yet, the crooks are so clever and convincing that they are believed to have conned more than 1.3 million people. Here are the five most common ways that they do it, and the tip-offs that help you know it's a scam:


Be A Mystery Shopper
You're looking for a job and answer an advertisement for mystery shoppers. The company sends you a check supposedly to cover the items you'll be buying and to "test" Western Union's services. You get to deduct your pay from the check too.
Tip-offs that this is a scam?
1. The check is for more than $1,000 and the company says you can keep a $200 or $300 fee for the job. Real mystery shoppers get paid $10 to $25 per job.
2. They paid in advance. Legitimate mystery shopping jobs pay only after you've turned in your review.
  1. Review Western Union? If the con artists were to be believed, Western Union would be the most mystery-shopped company in the world. They want you to use Western Union because sending this draft is the same as sending cash. Once it leaves your hands, it's gone.


Sweepstakes
You have won an international lottery! Congratulations! Here's a $20,000 check for just a portion of your winnings. To claim the additional hundreds of thousands of Euros or dollars that you've won, all you have to do is send a personal check for the taxes due on your winnings.
Tip-offs?
1. You didn't enter an international lottery. (I swear, you would remember if you did.)
2. Taxes are collected after you receive income, not before.
    3. Governments collect taxes, not lotteries.
Account Manager
You've been hired as the account manager at a major international distributor. You can work at home. Your only responsibility is to handle remittances. You get checks, deposit them into your own account and pass them on, subtracting your fee. Your fee is substantial.
Tip-offs?
1. International corporations have no problem opening their own bank accounts. Why do they need you to use yours? Oh ... because they're not an international corporation and if they used their own accounts, they couldn't steal your money.
    2. Jobs that require very little work for high pay don't exist unless you're a corporate Chief Executive Officer. And to get a job as a CEO, you need to know how to golf.
Overpayment
You are selling your car/puppy/chest-of-drawers and have placed an advertisement on the internet. You get contacted from somebody who just loves English Bull Terriers (or whatever you're selling) and is desperate to pay full price. Just one problem. The buyer is from overseas; hasn't yet opened a U.S. bank account; and can only pay with a third-party check -- maybe even a paycheck. If you take that check and deposit it, you can pay yourself and just give them cash for the overpayment, right?
Tip-offs?
  1. Opening a bank account with a paycheck is pretty dang easy. It might take a few hours, but the Bull Terriers can wait. If you cash this check, you are the bank and you have your first bad debt. (Congratulations. Maybe you can apply for a government bail-out.)
  2. Your Bull Terriers are clearly the cutest in the world, but there are others in the world -- even others in your state/city/county. Your buyer is generating a sense of urgency -- I've got to have one and I'm afraid they'll all be sold before I get my account opened! -- just to scam you. Tell them to let you know when their account is opened, and you'll put them on the list to have first pick of the next litter if this litter is, indeed, all spoken for by the time their bank account is opened.
Grant
You get an official looking letter saying that you have won a $100,000 grant from the government or some foundation. But to claim the grant money, you need to send a "processing fee."
Tip-offs?
1. You didn't apply for a grant.
2. You are not a scientist.
3. Government agencies and foundations that provide grants send you money. They don't ask you to send them money (unless they're soliciting donations ... and that's not the kind of letter you got).
 
-It's better to be Safe than be Sorry

-Birdy

TEN FREE THINGS FOR YOU


  1. Free checking. Last week we wrote an article about how, at many banks, free checking was soon to become fee checking. But plenty of banks still offer free checking accounts. SunTrust, for example, offers a free plan with no minimum balance required. And you get free online and ATM service too. Wachovia and U.S. Bank still have their own version of free accounts. Chase even offers $100 for opening such an account. Indeed, a host of banks and savings and loans offer free checking. So far. When you’re looking for lower fees, including free checking, always to look to smaller local banks and credit unions.
  1. Free credit reports. You can go to AnnualCreditReport.com for a free look at your credit history once a year. If the Financial Regulatory Reform bill passes, you might also one day get a look at your credit score.

  2. Free cash. If you can’t find an ATM near you for a free cash withdrawal, no worries: Plenty of stores will give you cash back with no fee when you use your ATM card to make even a small purchase. You can buy a candy bar or a Diet Coke and get back up to $100 in cash from Wal-Mart. Target will give you back $40 if you use your ATM card for a purchase. Grocery stores also offer cash back. 
     
  3. Free information calls. Google 411 will get you information numbers free, so don’t get ripped off by your cell phone provider. When you need directory assistance, dial 800-GOOG-411.

  4. Free scholarship search. Plenty of websites offer free searches for scholarships, such as Fastweb. There’s even a company called Free Scholarship Searches that offers links to 40 websites that offer free scholarship searches. 
     
  5. Free baggage. Sure, nearly all airlines are charging to check baggage but at least one doesn’t: Southwest
     
  6. Free entertainment. Your local library and parks offer lots of free fun, from books to movies to concerts. Join their e-mail list to see what’s up. And of course, there’s the Internet, offering free games as well as magazine and newspaper articles. Just go to the website of your favorite periodical.

  7. Free Water. While technically not free, tap water is about as close as you can get. If you’re concerned about water quality, buy a filter. But don’t ever pay for water again at a convenience store.

  8. Free TV. Thanks to sites like Hulu, you can now watch many popular television shows online for free. If your favorite shows are free on the web, why pay for cable or satellite? 
     
  9. Free telephone calls. Services like Skype and AIM let you communicate with other users for free. Always calling a loved one long distance? If you both get copies of something like Skype, you can talk all you want without paying a dime.

    -Birdy 

Tuesday, June 14, 2011

List of HTTP Status Codes



Status codes
301 Moved permanently
302 Found
303 See Other
403 Forbidden
404 Not Found


The following is a list of HyperText Transfer Protocol (HTTP) response status codes. This includes codes from IETF Internet standards as well as unstandardised RFCs, other specifications and some additional commonly used codes. The first digit of the status code specifies one of five classes of response; the bare minimum for an HTTP client is that it recognizes these five classes. Microsoft IIS may use additional decimal sub-codes to provide more specific information,[1] but these are not listed here. The phrases used are the standard examples, but any human-readable alternative can be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard.

CONTENTS:
      * 1 1xx Informational
      * 2 2xx Success
      * 3 3xx Redirection
      * 4 4xx Client Error
      * 5 5xx Server Error
      * 6 See also
      * 7 References

1xx Informational
Request received, continuing process.[2]

This class of status code indicates a provisional response, consisting only of the Status-Line and optional headers, and is terminated by an empty line. Since HTTP/1.0 did not define any 1xx status codes, servers must not send a 1xx response to an HTTP/1.0 client except under experimental conditions.

100 Continue
This means that the server has received the request headers, and that the client should proceed to send the request body (in the case of a request for which a body needs to be sent; for example, a POST request). If the request body is large, sending it to a server when a request has already been rejected based upon inappropriate headers is inefficient. To have a server check if the request could be accepted based on the request's headers alone, a client must send Expect: 100-continue as a header in its initial request[2] and check if a 100 Continue status code is received in response before continuing (or receive 417 Expectation Failed and not continue).[2]

101 Switching Protocols
This means the requester has asked the server to switch protocols and the server is acknowledging that it will do so.[2]

102 Processing (WebDAV) (RFC 2518)
As a WebDAV request may contain many sub-requests involving file operations, it may take a long time to complete the request. This code indicates that the server has received and is processing the request, but no response is available yet.[3] This prevents the client from timing out and assuming the request was lost.


2xx Success
This class of status codes indicates the action requested by the client was received, understood, accepted and processed successfully.

200 OK
Standard response for successful HTTP requests. The actual response will depend on the request method used. In a GET request, the response will contain an entity corresponding to the requested resource. In a POST request the response will contain an entity describing or containing the result of the action.[2]

201 Created
The request has been fulfilled and resulted in a new resource being created.[2]

202 Accepted
The request has been accepted for processing, but the processing has not been completed. The request might or might not eventually be acted upon, as it might be disallowed when processing actually takes place.[2]

203 Non-Authoritative Information (since HTTP/1.1)
The server successfully processed the request, but is returning information that may be from another source.[2]

204 No Content
The server successfully processed the request, but is not returning any content.[2]

205 Reset Content
The server successfully processed the request, but is not returning any content. Unlike a 204 response, this response requires that the requester reset the document view.[2]

206 Partial Content
The server is delivering only part of the resource due to a range header sent by the client. The range header is used by tools like Wget to enable resuming of interrupted downloads, or split a download into multiple simultaneous streams.[2]

207 Multi-Status (WebDAV) (RFC 4918)
The message body that follows is an XML message and can contain a number of separate response codes, depending on how many sub-requests were made.[4]

3xx Redirection
The client must take additional action to complete the request.[2]

This class of status code indicates that further action needs to be taken by the user agent in order to fulfil the request. The user agent without interaction with the user may carry out the action required, if and only if, the method used in the second request is GET or HEAD. A user agent should not automatically redirect a request more than five times, since such redirections usually indicate an infinite loop.

300 Multiple Choices
Indicates multiple options for the resource that the client may follow. It, for instance, could be used to present different forma t options for video, list files with different extensions, or word sense disambiguation.[2]

301 Moved Permanently
This and all future requests should be directed to the given URI.[2]

302 Found
This is the most popular redirect code [citation needed], but also an example of industrial practice contradicting the standard.[2] HTTP/1.0 specification (RFC 1945) required the client to perform a temporary redirect (the original describing phrase was "Moved Temporarily"),[5] but popular browsers implemented 302 with the functionality of a 303 See Other. Therefore, HTTP/1.1 added status codes 303 and 307 to distinguish between the two behaviors. However, the majority of Web applications and frameworks still use the 302-status code as if it were the 303[6].

303 See Other (since HTTP/1.1)
The response to the request can be found under another URI using a GET method. When received in response to a PUT, it should be assumed that the server has received the data and the redirect should be issued with a separate GET message.[2]

304 Not Modified
Indicates the resource has not been modified since last requested.[2] Typically, the HTTP client provides a header like the If-Modified-Since header to provide a time against which to compare. Utilizing this saves bandwidth and reprocessing on both the server and client, as only the header data must be sent and received in comparison to the entirety of the page being re-processed by the server, then sent again using more bandwidth of the server and client.

305 Use Proxy (since HTTP/1.1)
Many HTTP clients (such as Mozilla[7] and Internet Explorer) do not correctly handle responses with this status code, primarily for security reasons.[2]

306 Switch Proxy
No longer used.[2]

307 Temporary Redirect (since HTTP/1.1)
In this occasion, the request should be repeated with another URI, but future requests can still use the original URI.[2] In contrast to 303, the request method should not be changed when reissuing the original request. For instance, a POST request must be repeated using another POST request.

4xx Client Error
The 4xx class of status code is intended for cases in which the client seems to have erred. Except when responding to a HEAD request, the server should include an entity containing an explanation of the error situation, and whether it is a temporary or permanent condition. These status codes are applicable to any request method. User agents should display any included entity to the user. These are typically the most common error codes encountered while online.

400 Bad Request
The request cannot be fulfilled due to bad syntax.[2]

401 Unauthorized
Similar to 403 Forbidden, but specifically for use when authentication is possible but has failed or not yet been provided.[2] The response must include a WWW-Authenticate header field containing a challenge applicable to the requested resource. See Basic access authentication and Digest access authentication.

402 Payment Required
Reserved for future use.[2] The original intention was that this code might be used as part of some form of digital cash or micropayment scheme, but that has not happened, and this code is not usually used. As an example of its use, however, Apple's MobileMe service generates a 402 error ("httpStatusCode:402" in the Mac OS X Console log) if the MobileMe account is delinquent.

403 Forbidden
The request was a legal request, but the server is refusing to respond to it.[2] Unlike a 401 Unauthorized response, authenticating will make no difference.[2]

404 Not Found
The requested resource could not be found but may be available again in the future.[2] Subsequent requests by the client are permissible.

405 Method Not Allowed
A request was made of a resource using a request method not supported by that resource;[2] for example, using GET on a form which requires data to be presented via POST, or using PUT on a read-only resource.

406 Not Acceptable
The requested resource is only capable of generating content not acceptable according to the Accept headers sent in the request.[2]

407 Proxy Authentication Required[2]

408 Request Timeout
The server timed out waiting for the request.[2] According to W3 HTTP specifications: "The client did not produce a request within the time that the server was prepared to wait. The client MAY repeat the request without modifications at any later time."

409 Conflict
Indicates that the request could not be processed because of conflict in the request, such as an edit conflict.[2]

410 Gone
Indicates that the resource requested is no longer available and will not be available again.[2] This should be used when a resource has been intentionally removed; however, it is not necessary to return this code and a 404 Not Found can be issued instead. However, despite the most common status code for such a page being 404 Not Found, 410 Gone is still used by some servers, including Geocities. Upon receiving a 410-status code, the client should not request the resource again in the future. Clients such as search engines should remove the resource from their indices.

411 Length Required
The request did not specify the length of its content, which is required by the requested resource.[2]

412 Precondition Failed
The server does not meet one of the preconditions that the requester put on the request.[2]

413 Request Entity Too Large
The request is larger than the server is willing or able to process.[2]

414 Request-URI Too Long
The URI provided was too long for the server to process.[2]

415 Unsupported Media Type
The request entity has a media type which the server or resource does not support.[2] For example the client uploads an image as image/svg+xml, but the server requires that images use a different format.

416 Requested Range Not Satisfiable
The client has asked for a portion of the file, but the server cannot supply that portion.[2] For example, if the client asked for a part of the file that lies beyond the end of the file.

417 Expectation Failed
The server cannot meet the requirements of the Expect request-header field.[2]

418 I'm a teapot
This code was defined in 1998 as one of the traditional IETF April Fools' jokes, in RFC 2324, HyperText CoffeePot Control Protocol, and is not expected to be implemented by actual HTTP servers.

422 Unprocessable Entity (WebDAV) (RFC 4918)
The request was well-formed but was unable to be followed due to semantic errors.[4]

423 Locked (WebDAV) (RFC 4918)
The resource that is being accessed is locked[4]

424 Failed Dependency (WebDAV) (RFC 4918)
The request failed due to failure of a previous request (e.g. a PROPPATCH).[4]

425 Unordered Collection (RFC 3648)
Defined in drafts of "WebDAV Advanced Collections Protocol",[8] but not present in "Web Distributed Authoring and Versioning (WebDAV) Ordered Collections Protocol".[9]

426 Upgrade Required (RFC 2817)
The client should switch to a different protocol such as TLS/1.0.[10]

449 Retry With
A Microsoft extension. The request should be retried after performing the appropriate action.[11]

450 Blocked by Windows Parental Controls
A Microsoft extension. This error is given when Windows Parental Controls are turned on and are blocking access to the given WebPages.[12]

5xx Server Error
The server failed to fulfill an apparently valid request.[2]

Response status codes beginning with the digit "5" indicate cases in which the server is aware that it has encountered an error or is otherwise incapable of performing the request. Except when responding to a HEAD request, the server should include an entity containing an explanation of the error situation, and indicate whether it is a temporary or permanent condition. Likewise, user agents should display any included entity to the user. These response codes are applicable to any request method.

500 Internal Server Error
A generic error message, given when no more specific message is suitable.[2]

501 Not Implemented
The server either does not recognize the request method, or it lacks the ability to fulfill the request.[2]

502 Bad Gateway
The server was acting as a gateway or proxy and received an invalid response from the upstream server.[2]

503 Service Unavailable
The server is currently unavailable (because it is overloaded or down for maintenance).[2] Generally, this is a temporary state.

504 Gateway Timeout
The server was acting as a gateway or proxy and did not receive a timely response from the upstream server.[2]

505 HTTP Version Not Supported
The server does not support the HTTP protocol version used in the request.[2]

506 Variant Also Negotiates (RFC 2295)
Transparent content negotiation for the request results in a circular reference.[13]

507 Insufficient Storage (WebDAV) (RFC 4918)[4]

509 Bandwidth Limit Exceeded (Apache bw/limited extension)
This status code, while used by many servers, is not specified in any RFCs.

510 Not Extended (RFC 2774)
Further extensions to the request are required for the server to fulfill it.[14]

See also

* List of HTTP headers
* List of FTP server return codes
* Custom error page

References

  1. ^ "The HTTP status codes in IIS 7.0". Microsoft. July 14, 2009. http://support.microsoft.com/kb/943891/. Retrieved April 1, 2009.
  1. ^ a b c d e f g h i j k l m n o p q r s t u v w x y z aa ab ac ad ae af ag ah ai aj ak al am an ao ap aq ar as at Fielding, Roy T.; Gettys, James; Mogul, Jeffrey C.; Nielsen, Henrik Frystyk; Masinter, Larry; Leach, Paul J.; Berners-Lee, Tim (June 1999). Hypertext Transfer Protocol -- HTTP/1.1. IETF. RFC 2616. http://tools.ietf.org/html/rfc2616. Retrieved October 24, 2009.
  1. ^ Goland, Yaron; Whitehead, Jim; Faizi, Asad; Carter, Steve R.; Jensen, Del (February 1999). HTTP Extensions for Distributed Authoring -- WEBDAV. IETF. RFC 2518. http://tools.ietf.org/html/rfc2518. Retrieved October 24, 2009.
  1. ^ a b c d e Dusseault, Lisa, ed (June 2007). HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV). IETF. RFC 4918. http://tools.ietf.org/html/rfc4918. Retrieved October 24, 2009.
  1. ^ Berners-Lee, Tim; Fielding, Roy T.; Nielsen, Henrik Frystyk (May 1996). Hypertext Transfer Protocol -- HTTP/1.0. IETF. RFC 1945. http://tools.ietf.org/html/rfc1945. Retrieved October 24, 2009.
  1. ^ "HTTP/1.1 Section 10 Status Code Definitions". W3C. http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.3.3. Retrieved March 16, 2010.
  1. ^ "Mozilla Bugzilla Bug 187996: Strange behavior on 305 redirect". March 3, 2003. https://bugzilla.mozilla.org/show_bug.cgi?id=187996. Retrieved May 21, 2009.
  1. ^ Slein, Judy; Whitehead, Jim; Davis, Jim; Clemm, Geoffrey; Fay, Chuck; Crawford, Jason; Chihaya, Tyson (June 18, 1999). WebDAV Advanced Collections Protocol. IETF. I-D draft-ietf-webdav-collection-protocol-04. http://tools.ietf.org/html/draft-ietf-webdav-collection-protocol-04. Retrieved October 24, 2009.
  1. ^ Whitehead, Jim (December 2003). Reschke, Julian F.. ed. Web Distributed Authoring and Versioning (WebDAV) Ordered Collections Protocol. IETF. RFC 3648. http://tools.ietf.org/html/rfc3648. Retrieved October 24, 2009.
  1. ^ Khare, Rohit; Lawrence, Scott (May 2000). Upgrading to TLS Within HTTP/1.1. IETF. RFC 2817. http://tools.ietf.org/html/rfc2817. Retrieved October 24, 2009.
  1. ^ "2.2.6 449 Retry With Status Code". Microsoft. 2009. http://msdn.microsoft.com/en-us/library/dd891478(PROT.10).aspx. Retrieved October 26, 2009.
  1. ^ "Screenshot of error page" (bmp). http://zfhb6a.bay.livefilestore.com/y1pKZJpcqDcSF9uKwaTmx301Ilr7cbJGN94HXCoHvPGwuwAlt5DA4ln0Y-F1WE6ZUC3URdiJdRe4hILTo87jWx2Yg. Retrieved October 11, 2009.
  1. ^ Holtman, Koen; Mutz, Andrew H. (March 1998). Transparent Content Negotiation in HTTP. IETF. RFC 2295. http://tools.ietf.org/html/rfc2295. Retrieved October 24, 2009.

14. ^ Nielsen, Henrik Frystyk; Leach, Paul J.; Lawrence, Scott (February 2000). An HTTP C Extension Framework. IETF. RFC 2774. http://tools.ietf.org/html/rfc2774. Retrieved October 24, 2009.


Restaurants on the Cheap - 5 Ways to Get Deals on Dining Out

Do you just love to eat at restaurants, but feel the tab for dining out is getting a little excessive?

You can buy great meals at great restaurants for a pittance if you know how to find coupons and discounts for eating out, said Annie Korzen, an actress best known for her regular appearances in Seinfeld and a self-proclaimed “Bargain Junkie.”

Restaurants commonly sell $25 gift certificates for $10–and they can sometimes be had for as little as $2, said Korzen, author of the just published ”Bargain Junkie: Living the Good Life on the Cheap.” That’s just among 5 tips of how to get great deals at restaurants.
How do you get the best deals on restaurant meals?
  • Sign up at Restaurants.com, where you plug in your zip code and peruse a menu of dozens of local restaurants willing to sell a $25 gift certificate for $10 and a $50 certificate for $20. These gift certificates often go on “sale,” Korzen added. At times, you can buy your $25 meal gift certificate for just $2. 

  • BlackboardEats.com is another site that offers coupon deals for restaurants. The deals range from providing huge discounts, such as 30% off your meal, to offers for free appetizers or entrees. At the moment, they’ve only got deals in Los Angeles and New York. But if you happen to live in (or visit) one of those two areas, it’s worth a look. 

  • Groupon.com offers coupons on everything from spa visits to restaurant meals. The typical deal will discount your meal (or massage) from 30% to more than $75%. If you sign up, they’ll send regular emails of the daily deals in your area. You decide whether to buy or delete. 

  • ChowHound.com is a site where foodies talk to foodies. This recent discussion thread tells where you can get restaurant meals for $5 or less. Uhmmmm, tacos….
     
  • If you’re a drinker, call the restaurant where you want to eat and ask about their “corkage” fee, Korzen suggested. Some eateries will let you bring your own bottle and charge only a small fee to have the waiter serve it. Since restaurants typically mark-up a bottle of wine by 300 or 400%, bringing your own can save a bundle.
There’s just one caveat: Make sure you read the fine print on all of the coupon deals because the certificates do expire and some can only be used for lunch or on certain days. Most also add in the tip before deducting the value of the coupon to make sure that the waiter doesn’t get stiffed on the deal.


Enjoy -Birdy

Monday, June 13, 2011

National Hot-Line Numbers for Domestic Abuse and Rape


There is no excuse for violence against women. Yet every day, thousands of women are beaten, abused, raped, even murdered at the hands of family members, acquaintances, and those they love. 

Women who are abused are not faceless strangers; they are our neighbors, friends, co-workers, and relatives. Women who are abused come from every economic background and every age and stage of life. You may be experiencing abuse yourself, hiding the fact that you're living in an impossible situation because you're too terrified to reach out for help.

No One 'Deserves It'

If you have been abused, no matter what’s been said to you, know this: You did not deserve it. The abuse is not your fault. It’s hard to admit what is happening to you, but acknowledging abuse is the first step towards getting help and getting out of an abusive situation.

Just A Phone Call Away

There are a number of resources in most communities, but if you have nowhere to turn, two national hot lines can quickly connect you with local help and assistance:
National Domestic Violence Hotline at 1-800-799-SAFE (7233)

Online Assistance

If you need to find out more about resources and options before you feel comfortable enough to pick up a phone, RAINN – the Rape, Abuse & Incest National Network – can link you to a national sexual assault online hot-line that's available 24/7. RAINN also has in-depth articles and detailed, helpful information on a wide range of subjects specific to women and abuse. 

-Birdy 



Friday, June 10, 2011

Follow the following tips to reduce your chances of being the victim of auto theft.






    Always Take Your Keys. Never leave them in the car. Nearly 20% of all vehicles stolen had the keys in them.
  • Always Lock Your Car. Approximately 50% of all vehicles stolen were left unlocked.

  • Never Hide A Second Set of Key In Your Car. Extra keys can easily be found if a car thief takes time to look. 

  • Park in Well-lighted Areas. Over half of all vehicle thefts occur at night.
  • Park in Attended Lots. Auto thieves do not like witnesses and prefer unattended parking lots.

  • If you Park in an attended lot, leave only the ignition/door key. If your trunk and glove box use the same key as the door, have one of them changed. don't give the attendant easy access to your glove box and trunk. Upon returning, check the tires, spare and battery to insure they are the same as those you had when you parked.

  • Never leave your car running,even if you will only be gone for a minute. Vehicles are commonly stolen at convenience stores, gas stations, ATM's, etc. Many vehicles are also stolen on cold mornings when the owner leaves the vehicle running to warm up. Leaving your key in an unattended motor vehicle is a crime in some states.

  • Completely close your car windows when parking. Don't make it any easier for the thief to enter your vehicle.

  • Don't Leave Valuables in Plain View. Don't make your car a more desirable target and attract thieves by leaving valuables in plain sight.

  • Park with With Your Wheels Turned towards the curb. Make your car tough to tow away. Wheels should also be turned to the side in driveways and parking lots.

  • If Your Vehicle is Rear-Wheel Drive, Back Into Your Driveway. Front-wheel drive vehicles should be parked front end first. On four-wheel drive vehicles the rear wheels sometimes lock, making them difficult to tow.

  • Always Use Your Emergency Brake When Parking. In addition to ensuring safety, using the emergency brake makes your car harder to tow.

  • If You Have a Garage, Use It. If you have a garage, take the time to use it rather than parking outside where your vehicle is more vulnerable.

  • When Parking in a Garage, Lock the Garage Door and Your Vehicle. By locking both the garage and vehicle doors, the chances of deterring a thief greatly improve.

  • Don't Leave the Registration or Title in Your Car. A car thief will use these to sell your stolen car. File the title at your home or office, and carry registration in your purse or wallet.

  • Disable Your Vehicle When Leaving it Unattended for an Extended Period. Remove the electronic ignition fuse, coil wire, rotor distributor, or otherwise disable your vehicle anytime thieves may have extended access to it.

  • Replace "T" shaped Door Locks With Straight Locks. Some vehicle doors have lock assemblies at window level that flare out in a knob or "T' shape. A thief can use various tools to gain access inside the vehicle, grab and pull the lock. Straight locks prevent this.

  • Vehicle Identification Number (VIN). Stolen cars/parts are more easily traced when vehicle VIN numbers have been etched on car windows and major parts. ID stickers include VINs and can assist police in identifying your vehicle in the event that it is stolen.

  • Engrave Expensive Accessories. Engrave personal ID numbers on car stereos, cellular phones, etc., so the thief will have difficulty disposing of them. Do the same for car by using an ID sticker and VIN etching.

  • Drop Business Cards, Address Labels, or Other ID Inside Vehicle Doors. Car thieves usually alter vehicle identification numbers. By marking your vehicle a much as possible, you assist police in identifying your car.

  • Ignition Kill Switch. Splice an inexpensive toggle switch into your ignition wire or to your starter. The trick is hiding the switch well. Keypads, pressure pads and more expensive "Immobilizes" and "Passkeys" can also be used.

  • Fuel Kill Switch. The valve that halts the fuel supply is closed.

  • Visible Steering Wheel Lock. Prevents the steering wheel from being turned.

  • Floorboard Locks. Devices that disable the gas or brake pedal.

  • Gearshift Locks. Disables shifting of the transmission.

  • Tire/Wheel Locks. Prevents the vehicle from moving.

  • Hood Locks. Prevents the thief from gaining access to your security system and battery.

  • Armored Collar Around the Steering Column. Protects the column and ignition.

  • Alarms. Loud warnings sound when doors/hood/trunk are opened. Optional sensors include glass breakage, motion, tampering and towing. Panic buttons, back-up batteries, flashing parking lights or headlights, and automatic engine disable features are also recommended.

  • Vehicle Tracking. Transmitter hidden in car enables police to track car. ID sticker enables police and citizens to identify stolen car.

  • Be suspicious of any deal that sound too good to be true.

  • When buying from a private individual, make sure the title and registration match the name and address of the person selling the car.

  • Be cautious of a seller with no fixed address of employment or phone number.

  • Ask the seller for references about past financing and insurance on the vehicle. Verify the information with the bank, finance company, or agent.
  • Ensure the vehicle identification number (VIN) plate on the automobile dash is present, secure, and has no loose rivets. Check to see if there is an ID sticker in the glove box that matches VIN on dashboard.

  • Ensure that the VIN plate has not been repainted and the numbers stamped in the plate appear to be original factory numbers.

  • Ensure the VIN plate rivets are original. All 1970 and newer automobiles produced in North America have stainless steel "rosette" rivets with six petals and a hole inside the middle. They are difficult to scratch with a knife.

  • Thieves may remove the VIN plate and replace it with one from a similar wrecked vehicle. If in doubt about plate authenticity,check with a new car dealer who handles the same model or contact a law enforcement agency.

  • The VIN on the dash must match the VIN on the registration, title and federal safety inspection sticker on the drivers door.

  • If the VIN plate is scratched, bent or missing rivets, tampering may have occurred.

  • Make sure the federal safety inspection sticker, located on the driver's door or door jamb, is securely in place and none of the numbers appear to be tampered with.

  • Use special license plate locking screws to make it hard for thieves to remove your license plate during a robbery.

  • An excessively loose ignition switch may indicate tampering. Check the switch for chisel or pull marks.

  • Be wary of a fresh paint job on a newer vehicle. This may indicate an attempt to change the car's identity.

  • Check the inspection and license plate stickers to be sure they are current and issued by the same state.

  • If the seller provides you with only re-made keys, not original manufacturer's keys, for a newer model car, be suspicious. 

  • Titles and registrations are frequently counterfeited. Therefore, demand the title before paying, and make sure it matches the registration. By completing all paperwork at the time of sale, you avoid giving the thief extra time to obtain fraudulent documents.

  • Question the seller if the registration was recently issued on an older vehicle.

  • Compare the engine identification numbers with all other numbers to ensure a match.

  • Be cautious of new license plates on an old car, or new plate bolts on an older plate

    Remember Safety First -Birdy

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)