help for veterans,bullying,
FROM THE UNICORN.ONE FILES

BULLYING IS A PROBLEM OF YOUTH!! HOWEVER OTHERS' ARE ALSO AFFECTED THROUGH WORKPLACE BULLYING (often called SOCIAL BULLYING because it's behind someone's back) & PHYSICAL BULLYING.(use of Physical Force.)BULLYING IS HARASSMENT,
DEFINED AS "INTIMIDATION." 
IF YOU ARE AN ADOLESCENT OR YOUTH YOU ARE IN A SENSE PREDISPOSED TO BEING BULLIED.  BECAUSE YOU'VE GROWN UP USING  WIRELESS FORMS OF TECHNOLOGY LIKE TEXTING AND E-MAIL WHICH PREDATORS FAMILIAR WITH THE
TECHNOLOGY PREFER  TO USE.

 



CONNECTING VETERANS AND THEIR FAMILIES CONFIDENTALLY WITH QUALIFIED CARING DEPARTMENT OF VETERANS AFFAIRS
RESPONDERS, 24 HOURS / 7 DAYS A WEEK

Web Site
Toll Free Hotline 1-800-273-8255 Then Press 1

Chat Online
Text Message to 838255
Deaf / Hard of Hearing (TTY) 1-800-799-4889


      
THE LANGUAGE OF TEXT

One reason for the surge in texting abbreviations-more than 2,000 and counting, According to NetLingo-is the boom in social-media sites like Twitter, where messages are limited to 140 characters. Text messages, too, are limited in length, so users have developed an alphabet soup of shorthand abbreviations to save time, and their thumbs
A sampling of some often-used shorthand texting terms.

AFK....Away from keyboard          ALAP........As late as possible        AML.....All my love      10Q......Thank you       ?      I have a question        UG2BK . . . You got to be kidding         GBTW. . .Get back to work NMP . . . .Not my problem        PIR . .Parent in room GFTD....Gone for the day        FYEO. . . . For your eyes only                          BI5 . . ....Back in five minutes        DEGT . . Don't even go there BIL . . . . . Boss is listening        PAW. . . .Parents are watching                           99..... Parents are no longer watching PCM . . . . Please call me        IMS. . . . . I am sorry                                      TOY. . . . . Thinking of you KUTGW. . Keep up the good work        CID . . . Consider it done FWIW. . . For what it's worth           HAND . . . Have a nice day                     IAT . . . . . I am tired               NRN . . . . No response necessary 4COL. . . For crying out loud       WRUD. . . What are you doing LMIRL. . . Let's meet in real life            H5 . . . High five                            LOL....Lots of Love or Laugh out Loud      ALOL......Actually laughing out loud 511........To much information        831.......I love you POOF.........I'm gone            AATK.......Always at the keyboard ACK........Acknowledgement       AFKB.......Away From Keyboard AEAP.........As early as possible        CM.........Call Me CNP........Continued in next post          CUL8R.......See You Later CULA......See You Later Alligator     CUNS......See You In School  lCUOL.......See You OnLine        CYE.........Check your e-mail FTASB.......Faster Than A Speeding Bullet FTBOMH.........From The Bottom Of My Heart     FTE.......Full Time Employee FTFF.......That's Funny -or- Face To Face      GM.....Good Morning -or- Good Move GMAB.......Give Me A BreakGMAB......Give Me A Break GMTA.....Great Minds Think Alike GN.....Good NightGNBLFY...Got Nothing But Love For You GNSD..Good Night Sweet DreamsL8TR.......Later T2UL8TR.....Talk to you later

COMMON INTERNET THREATS

1. Viruses are self-executing, self-replicating programs. They alter the way a computer operates without the knowledge or permission of the user. When activated,, viruses may damage files, cause erratic system behavior, or display annoying messages. The ability to self-replicate differentiates viruses from Trojan horses and other virus-like programs.

2. A Worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only after their uncontrolled replication consumes system resources, slowing or halting other tasks.

4 Malware short for malicious software is software designed to infiltrate or damage a computer system without the owner's informed consent.

3. A Trojan Horse uses unprotected ports to open lines of communication with your computer, and can ultimately give hackers control over your machine. Active Trojan Horses are also called Remote Access Trojans.

If you find yourself in need of live entertainment: A great regional or national recording group, we highly recommend, Jeff Davis - Unicorn One Management & Talent Agency.


Page Created and Managed by
JEFF DAVIS - UNICORN ONE MANAGEMENT & TALENT AGENCY
11 Shadowbrook Lane #6, Milford MA 01757
Tel 774-573-1171
E-mail  unicorn.one@earthlink.net
www.unicornone.com
Every effort has been made to be as accurate as possible.
Please contact us at 774-573-1171 with any concerns.