AVG Family Safety User Manual

Total Page:16

File Type:pdf, Size:1020Kb

AVG Family Safety User Manual AVG Family Safety User Manual Document revision 2012.07 (1/2/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. This product uses code from C-SaCzech library, Copyright (c) 1996-2001 Jaromir Dolecek ([email protected]). This product uses compression library zlib, Copyright (c) 1995-2002 Jean-loup Gailly and Mark Adler. A V G Family Safety © 2 0 1 2 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved. 1 Contents 1. In.t.r..o.d..u..c..t.i.o.n.. ........................................................................................................ 4 1.1 Major fea.t.u..r.e..s. .a..n.d.. .a.d..v..a.n..t.a..g.e..s. ............................................................................ 4 2. In.s..t.a..l.la..t.i.o..n.. ......................................................................................................... 6 2.1 System R.e..q.u..i.r.e.m..e..n..t.s. ......................................................................................... 6 2.2 Installatio..n. .P..r.o..c.e..s.s.. ........................................................................................... 7 3. Ge..t.t.i.n..g.. .s.t.a..r.t..e.d.. .................................................................................................... 9 3.1 After Inst..a.l.la..t.i.o.n.. ............................................................................................... 9 3.2 Control .P.a..n..e.l. .................................................................................................. 10 3.3 Services.. .t.a.b..s. .................................................................................................. 11 3.4 Profile M..a.n..a.g..e..m..e.n..t. .......................................................................................... 11 3.5 Feature. .T.a..b..s. .................................................................................................. 14 3.6 Configur.a..t.i.o.n.. .W..i.n..d.o..w.. ....................................................................................... 15 3.7 Whole H.o..m..e.. .F.i.lt..e.r.i.n.g.. ........................................................................................ 15 4. A..c..t.i.v.i.t.y.. .m...o..n.i.t.o..r.i.n..g.. ............................................................................................ 19 4.1 Summar.y. ........................................................................................................ 20 4.2 All Sites. ......................................................................................................... 21 4.3 Social S.i.t.e.s.. .................................................................................................... 23 4.4 Searche.s.. ....................................................................................................... 24 4.5 Instant .M..e..s.s..a.g..e.s.. ............................................................................................ 25 4.6 Program.s. ........................................................................................................ 26 4.7 Alert Lo.g. ........................................................................................................ 27 5. P..a..r.e..n.t..a.l. .c..o.n..t.r..o.l.s.. ............................................................................................... 28 5.1 Categor.ie..s. ...................................................................................................... 29 5.2 Media .......................................................................................................... 37 5.3 Block Si.t.e.s.. ..................................................................................................... 40 5.4 Allow Si.t.e.s.. ..................................................................................................... 41 5.5 Options .......................................................................................................... 42 5.5.1 Bl.o..c.k.. ./. .W..a..r.n.. ./. .M..o..n.i.t.o..r. ............................................................................. 42 5.5.2 Pa..s.s..w..o.r..d. .O..v..e.r..r.id..e.. .................................................................................. 42 5.5.3 Se..c..o.n..d.a..r.y.. .P.a..s.s..w..o.r..d. ................................................................................ 42 5.5.4 Sa..f.e.. .S.e..a.r..c.h.. ........................................................................................... 42 5.5.5 Sa..f.e..t.y. .L..o.c..k. ............................................................................................ 42 5.5.6 Fi.l.e. .E..x.t.e..n..s.i.o.n.. .B.l.o..c.k..in..g. .............................................................................. 42 A V G Family Safety © 2 0 1 2 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved. 2 5.5.7 iC.a..t. ...................................................................................................... 42 5.6 Access .T..im..e..s. .................................................................................................. 53 5.7 Alerts .......................................................................................................... 54 5.8 Program.s. ........................................................................................................ 56 6. H..o..w.. .c..a..n. .I.... ....................................................................................................... 58 6.1 ...add a. .n.e..w.. .p..r.o.f.i.l.e.?.. ........................................................................................ 58 6.2 ...add a. .s.i.t.e.. .t.o. .t..h.e.. .a.l.l.o.w.. .s..it..e.s.. .li.s.t.?.. ..................................................................... 59 6.3 ...add a. .s.i.t.e.. .t.o. .t..h.e.. .b.l.o..c.k.. .s.i.t.e.s.. .li.s.t..?. ..................................................................... 60 6.4 ...apply .c..h..a.n..g.e..s. .t..o. .a..ll. .p..r.o.f.i.le..s.?.. .......................................................................... 61 6.5 ...assign.. .a. .p..r.o.f.i.l.e.?.. ........................................................................................... 62 6.6 ...assing.. .a. .p..r.o.f.i.l.e. .f.o..r. .W..h..o..le.. .H..o.m..e.. .F..il.t.e..r.in..g.?.. .......................................................... 63 6.7 ...block .a..c.c..e..s.s. .t..o. .s..e.l.e.c..t.e..d. .p..r.o..g.r.a..m..s. .o..n.. .m..y. .P..C..?. .................................................... 64 6.8 ...block .e..x.p..li.c..it. .m...u.s..ic.. .(.i.T.u..n..e.s.. .o.n..ly..).?.. ................................................................... 65 6.9 ...block .m..e..d..ia.. .u.s..in..g.. .r.a.t.i.n..g.s..?. .............................................................................. 66 6.10 ...block.. .u.n..c..a.t.e..g..o.r.i.z.e..d. .w...e.b..s.i.t.e..s.?. ....................................................................... 67 6.11 ...crea.t.e.. .a. .l.im...it.e..d.. .u.s..e.r. .a..c.c..o..u.n..t.?. ....................................................................... 68 6.12 ...crea.t.e.. .a. .s..e.c..o.n..d..a.r.y.. .p.a..s.s..w..o..r.d.?.. ...................................................................... 69 6.13 ...crea.t.e.. .a. .w..h..i.t.e. .l.i.s.t.?.. ..................................................................................... 70 6.14 ...edit .a.. .p.r.o..f.il.e..?. ............................................................................................. 71 6.15 ...login. .t.o.. .a. .p..r.o..f.il.e.'.s. .s..o.c..i.a.l. .s.i.t.e.. .a.c..c.o..u..n.t.?.. ............................................................ 72 6.16 ...manu..a..ll.y. .s..e.t..u.p.. .m..y.. .r.o.u..t.e..r. .f.o.r. .W...H..F. .S..e..r.v.i.c.e..s. ...................................................... 73 6.17 ...moni.t.o..r. .a. .p..r.o..f.il.e. .i.n.. .s.i.le..n.t.. .m..o.d..e..?. ..................................................................... 74 6.18 ...remo.v..e.. .a. .p..r.o.f.i.l.e.?.. ........................................................................................ 75 6.19 ...remo.v..e.. .a. .s..it.e.. .f.r.o..m.. .t.h..e. .a..ll.o..w.. .s.i.t.e..s. .l.is..t.?. ............................................................ 76 6.20 ...remo.v..e.. .a. .s..it.e.. .f.r.o..m.. .t.h..e. .b..lo..c..k. .s.i.t.e..s. .l.is..t.?. ............................................................ 77 6.21 ...restr.i.c.t.. .I.n.t.e..r.n..e.t. .a..c..c.e..s.s.. .t.im...e.s..?. ...................................................................... 78 6.22 ...setu.p. .e..m..a..il. .a..le..r.t.s.?.. ...................................................................................... 79 6.23 ...setu.p. .t..e.x..t. .(.S..M..S..). .a..le..r.t.s.?.. .............................................................................. 80 6.24 ...turn .o..f.f. .A..c.t..iv..it..y. .m..o..n..it.o..r.i.n.g..?. .......................................................................... 81 6.25 ...turn .o..f.f. .i.C.a..t. .f.e..a.t..u.r.e..?. ................................................................................... 82 6.26 ...turn .o..f.f. .t.h..e. .S..a..f.e. .s..e.a..r.c..h. .f.e..a.t..u.r.e..?. ................................................................... 83 6.27 ...turn .o..f.f. .t.h..e. .s..o.c..i.a.l.
Recommended publications
  • PROGRAM November 18-20, 2015 THANKS to the 2015 Children, Youth & Media Conference Sponsors
    Toronto PROGRAM November 18-20, 2015 THANKS tO tHe 2015 ChIlDrEn, YoUtH & MeDiA CoNfErEnCe sponsors MAIN SPONSOR PRESTIGE SPONSORS EXCELLENCE SPONSORS 2 SPECIAL THANKS Youth Media Alliance would like to warmly thank its 2015 Children, Youth & Media Conference advisory committee: NATALIE DUMOULIN / 9 Story Media Group MARTHA SEPULVEDA / RACHEL MARCUS / Guru Studio Breakthrough Entertainment MICHELLE MELANSON CUPERUS / CLAUDIA SICONDOLFO Radical Sheep Productions JULIE STALL / Portfolio Entertainment LYNN OLDERSHAW / Kids’ CBC TRAVIS WILLIAMS / Mercury Filmworks MIK PERLUS / marblemedia SUZANNE WILSON / TVO Kids JAMIE PIEKARZ / Corus Entertainment And the volunteers: KELLY LYNNE ASHTON, KAYLA LATHAM, HENRIKA LUONG, TATIANA MARQUES, JAYNA RAN and MARCELA LUCIA ROJAS. TABLE OF CONTENTS Words from Chair .............................................................................p. 4 Words from Executive Director ............................................................p. 5 Schedule and Venue ..........................................................................p. 6 General Conference ..........................................................................p. 8 Workshop with Sheena Macrae ............................................................p. 12 Workshop with Linda Schuyler .............................................................p. 12 Prix Jeunesse Screening ....................................................................p. 13 Speakers’ Biographies .......................................................................p.
    [Show full text]
  • Comodo System Cleaner Version 3.0
    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
    [Show full text]
  • Cuteftp Pro V8 Utorrent
    1 / 2 CuteFTP Pro V8 Utorrent 2.1 Server ... FileZilla FTP Client, WS FTP, Bullet Proof FTP, CuteFTP ... Vuze (formerly Azureus), utorrent, Transmission, Deluge, qBittorrent, .... Nero 8 Ultra Edition 8 3 13 0 crack. Utorrent 1.8.3 serial keygen. Globalscape Cuteftp Pro 8 3 3 054 key code generator. Betterzip 1.8.3 crack.. CuteFTP Pro V8 Utorrent cuteftp, cuteftp free, cuteftp mac, cuteftp server, cuteftp vs filezilla, cuteftp sftp, cuteftp portable, cuteftp crack, cuteftp 8 professional, .... Download CCProxy 8 is easy-to-use and powerful. ... allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP. ... Previous uTorrent Pro Crack 3.5.4 Build 44590 & Key Free Download.. Find SophosLabs data about viruses, spyware, suspicious behavior and files, adware, PUAs, and controlled applications and devices. · ABC · ABC Client · ANts P2P .... FCleaner 1.3.1.621Jul 12th; Registry Gear 2.1.1.609Jun 9th; CuteFTP Pro 8.3.4Jun 2nd; CuteFTP Lite 8.3.4Jun 2nd ... [Show All]8 softwares in this category. 8 September 2012 at 16:11 Reply ... [SOFTWARE] uTorrent Turbo Booster · [GAMES] JUST CAUSE 2 SKIDROW + DLC LIMITED CONTENT · [OS] ... [CUSTOM] AlienWare Full Pack · [SOFTWARE] CuteFTP / Cute FTP Professional v8.3.3.. Cakewalk Dimension Pro DXi and VSTi sampler synthesizer works great with ... FXsound DFX Audio Enhancement v8.0 for Windows Media Player & Winamp ... GlobalSCAPE CuteFTP 4.2; GlobalSCAPE CuteFTP 8, 8.0.4 Pro (Error ... Beta (Chinese Simplified/Traditional); uTorrent 1.6; WinMX 3.54 (Beta 4).. Able2Extract Professional v8.0.28.0 Incl Crack [TorDigger] utorrent · SpyKey.rar Serial Key keygen · PATCHED Win 10 Pro RS3 En-us (x86 x64) ...
    [Show full text]
  • Complaint of ) ) Free Press and Public Knowledge ) ) __- ______Against Comcast Corporation ) ) for Secretly Degrading Peer-To-Peer Applications ) ) To: Ms
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 Formal Complaint of ) ) Free Press and Public Knowledge ) ) __- _______ Against Comcast Corporation ) ) For Secretly Degrading Peer-to-Peer Applications ) ) To: Ms. Marlene H. Dortch, Secretary, FCC ) Formal Complaint Marvin Ammori, General Counsel Andy Schwartzman Ben Scott, Policy Director Harold Feld Free Press Parul Desdai 501 Third Street NW, Suite 875 Media Access Project Washington, DC 20001 1625 K Street, NW 202-265-1490 Suite 1000 Washington, DC 20006 (202) 232-4300 November 1, 2007 Table of Contents Summary ..................................................................................................................................i I. Facts ........................................................................................................................1 A. Parties..................................................................................................................1 B. Network Neutrality Background...........................................................................2 C. Comcast Blocks Innovative Applications .............................................................5 D. Comcast’s Methods are Deliberately Secretive.....................................................9 II. Legal Argument .....................................................................................................12 A. Degrading Applications Violates the Commission’s Internet Policy Statement, Which the FCC Has Vowed to Enforce..............................................................12
    [Show full text]
  • Special Characters A
    453 Index ■ ~/Library/Safari/WebpageIcons.db file, Special Characters 112 $(pwd) command, 89–90 ~/Library/Saved Searches directory, 105 $PWD variable, 90 ~/Library/Services directory, 422–423 % (Execute As AppleScript) menu option, ~/Library/Workflow/Applications/Folder 379 Actions folder, 424 ~/ directory, 6, 231 ~/Library/Workflows/Applications/Image ~/bin directory, 6, 64, 291 Capture folder, 426 ~/Documents directory, 281, 290 ~/Movies directory, 323, 348 ~/Documents/Knox directory, 255 ~/Music directory, 108, 323 ~/Downloads option, 221, 225 ~/Music/Automatically Add To iTunes ~/Downloads/Convert For iPhone folder, folder, 424 423–424 ~/Pictures directory, 281 ~/Downloads/MacUpdate ~/.s3conf directory, 291 Desktop/MacUpdate Desktop ~/ted directory, 231 2010-02-20 directory, 16 ~/Templates directory, 60 ~/Downloads/To Read folder, 425 ~/Templates folder, 62 ~/Dropbox directory, 278–282 Torrent program, 236 ~/Library folder, 28 1Password, 31, 135, 239–250 ~/Library/Application 1Password extension button, 247–248 Support/Evom/ffmpeg directory, 1Password.agilekeychain file, 249 338 1PasswordAnywhere tool, 249 ~/Library/Application 1Password.html file, 250 Support/Fluid/SSB/[Your 2D Black option, 52 SSB]/Userstyles/ directory, 190 2D With Transparency Effect option, 52 ~/Library/Application Support/TypeIt4Me/ 2-dimensional, Dock, 52 directory, 376 7digital Music Store extension, 332 ~/Library/Caches/com.apple.Safari/Webp age Previews directory, 115 ~/Library/Internet Plug-Ins directory, 137 ■A ~/Library/LaunchAgents directory, 429, 432
    [Show full text]
  • Stellar Bitraser File Eraser(2 MB, PDF)
    BITRASER FILE ERASER Wipe Files Beyond Recovery Secure File Erasure Software For Safeguarding Privacy BitRaser File Eraser DIY software for permanent wiping of sensitive files, web browsing history, app & system traces, & deleted files from laptop, desktops, and external storage media. Wipe sensitive files across devices. Ensure data safety! BitRaser File Eraser is a simple & powerful software for safeguarding data through secure wiping of sensitive files on Windows systems. The tool is ideal for anyone who uses a computer and wants to secure themselves from data breach or leakage threats. Erase files & folders Wipe identity Erase web browsing from Windows PC and documents, tax records, history from Chrome, external storage, etc. photos & videos, etc. Mozilla, Safari, etc. Available for: Know more © Copyright Stellar Information Technology Pvt. Ltd. All Trademarks Acknowledged. www.stellarinfo.com BITRASER FILE ERASER WIPES ALL TYPES OF SENSITIVE FILES ERASES ALL DEVICES & DRIVES Erases photos, videos, tax records, social security Wipes Windows PC, USB flash drives, external number, credit card statement, personal health HDD, SD Card & even files stored on servers. records, official documents and more. CLEARS WEB BROWSING HISTORY REMOVES APPLICATION TRACES TRACES Erases browsing history, cookies, temporary files, Removes activity logs, preferences, etc. generated favorites, etc. Supports Chrome, Mozilla, Safari, IE, with use of News apps, Instant Messengers, Email Microsoft Edge, Opera, & SeaMonkey. apps, Peer to Peer apps, & more. ERASES THE DELETED FILES SCHEDULES THE ERASURE TASKS Wipes the deleted files from system by erasing the Allows to preset & run wiping tasks based on time, day unused space freed up after deletion. Secures & frequency. You can choose specific files for wiping against retrieval of sensitive deleted files.
    [Show full text]
  • Multiresolution Recurrent Neural Networks: an Application to Dialogue Response Generation
    Multiresolution Recurrent Neural Networks: An Application to Dialogue Response Generation Iulian Vlad Serban∗◦ Tim Klinger University of Montreal IBM Research 2920 chemin de la Tour, T. J. Watson Research Center, Montréal, QC, Canada Yorktown Heights, NY, USA Gerald Tesauro Kartik Talamadupula Bowen Zhou IBM Research IBM Research IBM Research T. J. Watson Research Center, T. J. Watson Research Center, T. J. Watson Research Center, Yorktown Heights, Yorktown Heights, Yorktown Heights, NY, USA NY, USA NY, USA Yoshua Bengioy◦ Aaron Courville◦ University of Montreal University of Montreal 2920 chemin de la Tour, 2920 chemin de la Tour, Montréal, QC, Canada Montréal, QC, Canada Abstract We introduce the multiresolution recurrent neural network, which extends the sequence-to-sequence framework to model natural language generation as two parallel discrete stochastic processes: a sequence of high-level coarse tokens, and a sequence of natural language tokens. There are many ways to estimate or learn the high-level coarse tokens, but we argue that a simple extraction procedure is sufficient to capture a wealth of high-level discourse semantics. Such procedure allows training the multiresolution recurrent neural network by maximizing the exact joint log-likelihood over both sequences. In contrast to the standard log- likelihood objective w.r.t. natural language tokens (word perplexity), optimizing the joint log-likelihood biases the model towards modeling high-level abstractions. We apply the proposed model to the task of dialogue response generation in arXiv:1606.00776v2 [cs.CL] 14 Jun 2016 two challenging domains: the Ubuntu technical support domain, and Twitter conversations. On Ubuntu, the model outperforms competing approaches by a substantial margin, achieving state-of-the-art results according to both automatic evaluation metrics and a human evaluation study.
    [Show full text]
  • Children's DVD Titles (Including Parent Collection)
    Children’s DVD Titles (including Parent Collection) - as of July 2017 NRA ABC monsters, volume 1: Meet the ABC monsters NRA Abraham Lincoln PG Ace Ventura Jr. pet detective (SDH) PG A.C.O.R.N.S: Operation crack down (CC) NRA Action words, volume 1 NRA Action words, volume 2 NRA Action words, volume 3 NRA Activity TV: Magic, vol. 1 PG Adventure planet (CC) TV-PG Adventure time: The complete first season (2v) (SDH) TV-PG Adventure time: Fionna and Cake (SDH) TV-G Adventures in babysitting (SDH) G Adventures in Zambezia (SDH) NRA Adventures of Bailey: Christmas hero (SDH) NRA Adventures of Bailey: The lost puppy NRA Adventures of Bailey: A night in Cowtown (SDH) G The adventures of Brer Rabbit (SDH) NRA The adventures of Carlos Caterpillar: Litterbug TV-Y The adventures of Chuck & friends: Bumpers up! TV-Y The adventures of Chuck & friends: Friends to the finish TV-Y The adventures of Chuck & friends: Top gear trucks TV-Y The adventures of Chuck & friends: Trucks versus wild TV-Y The adventures of Chuck & friends: When trucks fly G The adventures of Ichabod and Mr. Toad (CC) G The adventures of Ichabod and Mr. Toad (2014) (SDH) G The adventures of Milo and Otis (CC) PG The adventures of Panda Warrior (CC) G Adventures of Pinocchio (CC) PG The adventures of Renny the fox (CC) NRA The adventures of Scooter the penguin (SDH) PG The adventures of Sharkboy and Lavagirl in 3-D (SDH) NRA The adventures of Teddy P. Brains: Journey into the rain forest NRA Adventures of the Gummi Bears (3v) (SDH) PG The adventures of TinTin (CC) NRA Adventures with
    [Show full text]
  • Article 119 6465 Pdf 100.Pdf
    The European Proceedings of Social & Behavioural Sciences EpSBS ISSN: 2357-1330 https://doi.org/10.15405/epsbs.2019.09.02.13 EEIA 2019 International Conference "Education Environment for the Information Age" FORMATION OF PROFESSIONAL COMPETENCES BY MODERN INFORMATIZATION Tatiana A. Averianova (a)*, Galina A. Kasatova (b), Bella L. Kagan-Rozentsveig (c) *Corresponding author (a) Nosov Magnitogorsk State Technical University. Address: 455000, Magnitogorsk, Lenin Avenue, 38. E-mail: [email protected]* (b) Nosov Magnitogorsk State Technical University. Address: 455000, Magnitogorsk, Lenin Avenue, 38. E-mail: [email protected] (c) Nosov Magnitogorsk State Technical University. Address: 455000, Magnitogorsk, Lenin Avenue, 38. E-mail: [email protected] Abstract The aim of this study is to present the process of forming the professional competence of bachelors in the field of “Technology of artistic processing of materials” in the system “study group – college – university” by informatization. In accordance with this purpose, the following tasks were accomplished: we have analyzed the existing problems; the educational system “study group – college – university” was created; and also we have implemented a system of professional selection. The methodology of forming professional competencies by informatization was introduced at all stages of the given system. The following methods are used: analysis, modeling, and actualization. Modern scientists repeatedly outlined the importance of the questions about the need for continuous improvement in the field of information technologies for the purpose of targeting, selecting and implementing funds in the professional field, expanding the information base for providing educational institutions, and the need for the teaching staff mobility in advancing their educational level in the field of information and communication technologies.
    [Show full text]
  • Johnny Test CYOA (Jumpchain-Compliant!) +1000 CP
    Johnny Test CYOA (Jumpchain-Compliant!) You're not sure why your benefactor put you here, really. The animation is cheap and choppy, and you're pretty sure you don't actually like anyone here. That said, a world is a world, and with any luck, you can make an impact on this one. Of course, don't be surprised if some of your plans go a bit haywire. That's just another day in the life of a boy named Johnny Test. If you want to get anything out of this trip, you'll need these. +1000 CP Good luck, and have fun in Porkbelly! Or, at least try to. See, there's two last little provisions here. Should Johnny Test or any of his enemies or family members be slain, by your hand or any other, you will fail. This includes being trapped in permanent stasis or being permanently banished/barred from the “real world” of this dimension. There is, however, a certain limit to this – Bumper is fair game. Bling-Bling Boy, on the other hand, is not. The second? You know that time machine? Traveller! You can't do that! The future will be changed! You'll create a time paradox! Section 1: Background Roll 1d8+11 to determine your age and keep your current gender, or pay 50 CP to choose your age (within the rollable range) and gender for yourself. Drop-In [Free] – You don't have any new memories or new quirks here – but nobody here knows you, and at least some of them can tell there's something off about you..
    [Show full text]
  • Page 01 Dec 11.Indd
    TUESDAY 11 DECEMBER 2012 • [email protected] • www.thepeninsulaqatar.com • 4455 7741 inside Bill Murray brings COMMUNITY • QP organises seminar his charm to the on occupational health nursing role of FDR P | 4 P | 8-9 CAMPUS • QU programmes get international accreditation P | 5 HEALTH • Cells from patients’ own blood spur cancer remission: Study P | 7 RECIPE CONTEST • Participate in our recipe contest and win a dinner voucher for two P | 10 TECHNOLOGY • Best Android apps of this week Music • Apple Maps could be life-threatening: Police with passion P | 12 World-famous cellist and conductor Han-Na LEARN ARABIC Chang assumes the role of music director • Learn commonly used of Qatar Philharmonic Orchestra starting Arabic words and their September 2013, becoming the first woman meaning through the pages music director of the 101-member orchestra of Peninsula Plus. P | 2-3 since it was founded in 2007. P | 13 2 PLUS | TUESDAY 11 DECEMBER 2012 COVER STORY “Han-Na is the kind of person with a drive for continual development. After a long career as a famous cellist, she decided to rise to the conducting challenge. She combines her Asian roots with western musical traditions, and is now keen to delve further into Arabic traditions and society. She will help this orchestra grow and evolve,” Kurt Meister Executive Director Qatar Philharmonic Orchestra “Music is about emotions, heart and soul” By RaynaldRayynaald C RRiveraivere a mumusicsic didirector,rector, anandd I’I’llll ddoo my uutmosttmost to ssupportupport tthem.”hem.” turn to conducting,conducting, andand in 2007 she made her conducting Chang’sChang’g s riserir ses toto prominencepromo inencec startedstaartted asas a childchild prod-prod- debutdebut in Korea.Korea.
    [Show full text]
  • 1. Infamous 2. Mass Effect 3. Final Fantasy Tactics 4. Fire Emblem 5. FMA 6. KOTOR 7. One Piece 8. Pacific Rim 9. Red Alert 3 10
    1. Infamous 2. Mass Effect 3. Final Fantasy Tactics 4. Fire Emblem 5. FMA 6. KOTOR 7. One Piece 8. Pacific Rim 9. Red Alert 3 10. TF2 11. Wakfu 12. Song of Ice & Fire 13. Adventure Time 14. Age of Myth 15. Archer 16. Banjo-Kazooie 17. Bioshock 18. Black Bullet 19. Buffyverse 20. Courage 21. DC 22. Digimon 23. Doctor Who 24. Dragon Commander 25. Dragon Age 26. Fallout 27. Fire Emblem 28. Firefly 29. Generic Magical Girl * 30. Halo 31. Harry Potter 32. Iji 33. Invader Zim 34. Jackie-Chan Adventure 35. Jojo 36. LLTQ 37. LOTR 38. Marvel 39. Mega Man Battle Network 40. Megaman Classic 41. Mega Man X 42. Metal Gear Rising 43. Metal Gear Solid 44. Mother 45. Populous 46. Raildex Science 47. Ravenloft 48. Skies of Arcadia 49. Soul Caliber 50. Star Trek TNG 51. Star Trek 52. TES 53. Sims 3 54. Tropico 55. Twilight 56. VtM 57. Wheel of Time 58. Yugioh 59. King Arthur 60. Light of Terra (Part 3 Needed) 61. LoSS 62. RWBY 63. 007 64. 80’s Action 65. A Certain Magical Index 66. Ace Attorney 67. Ace Combat 68. Alien 69. Alpha Protocol 70. Animal Crossing 71. Ar Tonelico 72. Assassin’s Creed 73. Asura’s Cryin 74. Asura’s Wrath 75. Avatar the Last Airbender 76. Babylon 5 77. Bayonetta 78. Berserk 79. BeyBlade 80. Bionicle 81. BlazBlue 82. Bleach 83. Bloody Roar 84. Borderlands 85. Castelvania 86. CATastrophe 87. City of Heroes 88. Code Geasss 89. Command & Conquer 90. Cooking Show 91. Cowboy Bebop 92.
    [Show full text]