Baldati

Search News

News

Ano Awad

Ano Awad

Take charge of your online reputation Chances are you already have an online reputation, even if you do not know it. On the Internet, you create an image of yourself through the information you share in blogs, comments, tweets, snapshots, videos, and links. Others add their own opinions (good or bad), which contribute to your reputation. Anyone can find this information and use it to make judgments about you. For example, research commissioned by Microsoft found that of the U.S. hiring managers and job recruiters surveyed, 79% routinely review online reputational information when considering job applicants. Most of those surveyed count online reputation as one of their top selection criteria. In fact, 70% of the U.S. hiring managers in the study they have rejected candidates based on what they found. Top disqualifiers included unsuitable photos and videos, concerns about the applicant's lifestyle, and inappropriate comments. • Find out what is on the Internet about you • Evaluate your online reputation • Protect your online reputation • Polish your professional reputation • Restore your online reputation Find out what is on the Internet about you Use search engines Type your first and last name into several popular search engines. Search for images as well as text. Be specific to increase your search effectiveness. Put quotation marks around your name. Specify the city where you live, your employer, or other keywords that apply only to you. Avoid searching for national identity numbers or Social Security numbers. If you see these (or other sensitive data like credit card numbers, grades, or health information) in search results, ask the website owner to remove the data immediately. Search all variations of your name. If you have ever used a different name or nickname, if you use your middle name or initial, or if your name is frequently misspelled, check these as well. Include personal domain names (for example, yourname.com) in your search. Check sites you frequent. Search online directories and sites that compile public records, genealogy sites, the websites of organizations to which you belong or donate time or money, and the like. Search blogs and social networks Review what others have posted about you in comments, pictures, or videos. Explore their blogs, personal pages on social networking sites (Facebook, LinkedIn, Orkut, Qzone, Twitter), or photo-sharing sites like Flickr and Snapfish. (Parts of these sites are inaccessible to many search engines, so you must look separately.) Evaluate your online reputation After you have gathered this information, think about the story it tells. Does it reflect the way you want others to perceive you? If not, what is missing? Is it accurate? If not, what should be deleted or corrected? Do you need more than one online profile—whether professional, personal, or for an area of interest, like a hobby or volunteer work? If so, is it okay to mix information from different profiles? Do you want your profiles to be public or more private? Your answers to these questions are important because information online is searchable, often permanent, and may be seen by anyone on the Internet. Unlike data stored on paper, online information can be aggregated by Internet search engines and other tools, which makes it easier for others to put together their own idea of who you are. websites may archive what you have posted and data they have collected from you. Friends (or ex-friends) may divulge it; malicious programmers and security lapses may expose it. Protect your online reputation Act online in a manner that reflects the reputation you want to earn—whether you are building on an existing reputation, discarding an old persona, or creating a new one. Think before you share Before you put anything online, think about what you are posting, who you are sharing it with, and how this will reflect on your reputation. Would you be comfortable if others saw it? Or saw it ten years from now? When you choose photos and videos, think about how others might perceive them. Talk with your friends about what you do and do not want shared. Ask them to remove anything that you do not want disclosed. Treat others as you would like to be treated Be civil in what you say and show on the web. Respect the reputation and privacy of others when you post anything about them (including pictures) on your own pages or on others' pages or public sites. Remove anything that does not honor this. Stay vigilant about what the Internet is saying about you Sign up for personal alerts. Some search engines will automatically notify you of any new mention of your name or other personal information. From time to time, search for yourself to see what additional information has been catalogued in search engines. Periodically reassess who has access to your pages. Friends change over time; it is okay to remove those who no longer belong. Polish your professional reputation Publish positive information about yourself To be your online best, create what you want others to see. Link anything you publish to your name. Join a professional network such as LinkedIn or CareerBuilder. Put together a robust profile and make connections with colleagues there. Ask for recommendations from those who know your work well. Comment on professionally-oriented blogs, participate in online forums, and review books on subjects in which you have expertise. Start a blog or register a website in your own name. • Publicize yourself through clear writing, straightforward design, and high quality images. • Write regularly (at least twice a month) on a subject about which you are knowledgeable. • Invite visitors to make comments to create a conversation. Consider separating professional and personal profiles Use different email addresses, screen names, blogs, and websites for each profile. Do not link your real name (or sensitive personal information such as your home and email addresses, phone numbers, or photos) with other profiles that you create. Add personal information to your professional profile judiciously and only as it reflects well on that image. Avoid cross references to personal sites. Some social networks let you build separate friends lists—for family, your sports team, work, and so on—so that you can manage what you share within one profile. Look for Settings or Options to help you manage who can see your profile or photos, how people can search for you, who can make comments, and how to block unwanted access by others. Restore your online reputation If you find information about yourself that does not fit the reputation you want, act quickly. The longer it stays public, the greater the chance that it will be spread or archived. In a respectful way, ask the person who posted it to remove it or correct an error. If it is a correction, ask him or her to include a notice (CORRECTION or UPDATED) right next to the original (incorrect) material. If the person does not respond or refuses to help, ask the website administrator to remove the digital damage. If you feel a public correction is necessary, present your case simply and politely without attacking the person.

Ano Awad

Ano Awad


Bullies are notorious for tormenting their victims face to face—at school, on the playground, in sports. But now, cyberbullying (or online bullying) opens the door to 24-hour harassment through computers, cell phones, gaming consoles, or other Internet-enabled means.

·        Talk with your kids about cyberbullying. Ask your kids what they're doing online and encourage them to report bullying to you. Promise that you will take action on their behalf and explain what you will do. Reassure them that you won't curtail their phone or computer privileges.

·        Keep the family computer in a central location. If your kids play video games, keep Internet-connected game consoles in a central location also. Teenagers have so many ways to access the Internet that putting the computer in a central spot isn't always effective. With older kids, it's especially important to have frank discussions.

·        Look for signs of online bullying-for example, getting upset when online or a reluctance to go to school.

·        Don't tolerate cyberbullying at home. Let your children know they should never, under any circumstances, bully someone. Make the consequences clear.

·        Keep passwords secret. Urge your kids not to share passwords or other information that could be used to bully them, or to loan their cell phones or laptops.

·        Encourage your children to make friends and to help friends look out for each other. Cyberbullies are less likely to target those whom they perceive have strong friendships. If a victim has friends who rally around him or her, the bullying usually stops.

·        Get help from technology. Turn on the safety features available in most programs and services such as those in Windows 7, Windows Vista, Xbox LIVE, and the Zune digital media player.

What to do if someone is cyberbullying your child

The best support for a child being cyberbullied is positive, active, knowledgeable, and predictable support.

·        Act immediately. Your child needs to know that you can and will help. Don't wait to see if the abuse will stop. If you feel that your child is physically at risk, call the police at once.

·        Every effort should be made to find the cyberbully and hold him or her accountable. If the bully is a student consider reporting it to the school. Report bullying to the website where the bullying is happening. Many services have moderators and places to report abuse—for example, abuse@microsoft.com. Ask cell phone companies to track calls and take action.

·        Tell your kids not to respond to the cyberbully or retaliate because bullies are looking for a reaction. Don't answer phone calls, or reply to (or even read) text messages or comments.

·        Block cyberbullies. Most web services will allow you to block anyone whose behavior is inappropriate or threatening in any way. Check with the service— social networking, IM, cell phone—to find out how.

·        Save the evidence. Save text messages, emails, and other evidence of cyberbullying in case the authorities need it. 

Ano Awad

Ano Awad


Bullies are notorious for tormenting their victims face to face—at school, on the playground, in sports. But now, cyberbullying (or online bullying) opens the door to 24-hour harassment through computers, cell phones, gaming consoles, or other Internet-enabled means.

·        Talk with your kids about cyberbullying. Ask your kids what they're doing online and encourage them to report bullying to you. Promise that you will take action on their behalf and explain what you will do. Reassure them that you won't curtail their phone or computer privileges.

·        Keep the family computer in a central location. If your kids play video games, keep Internet-connected game consoles in a central location also. Teenagers have so many ways to access the Internet that putting the computer in a central spot isn't always effective. With older kids, it's especially important to have frank discussions.

·        Look for signs of online bullying-for example, getting upset when online or a reluctance to go to school.

·        Don't tolerate cyberbullying at home. Let your children know they should never, under any circumstances, bully someone. Make the consequences clear.

·        Keep passwords secret. Urge your kids not to share passwords or other information that could be used to bully them, or to loan their cell phones or laptops.

·        Encourage your children to make friends and to help friends look out for each other. Cyberbullies are less likely to target those whom they perceive have strong friendships. If a victim has friends who rally around him or her, the bullying usually stops.

·        Get help from technology. Turn on the safety features available in most programs and services such as those in Windows 7, Windows Vista, Xbox LIVE, and the Zune digital media player.

What to do if someone is cyberbullying your child

The best support for a child being cyberbullied is positive, active, knowledgeable, and predictable support.

·        Act immediately. Your child needs to know that you can and will help. Don't wait to see if the abuse will stop. If you feel that your child is physically at risk, call the police at once.

·        Every effort should be made to find the cyberbully and hold him or her accountable. If the bully is a student consider reporting it to the school. Report bullying to the website where the bullying is happening. Many services have moderators and places to report abuse—for example, abuse@microsoft.com. Ask cell phone companies to track calls and take action.

·        Tell your kids not to respond to the cyberbully or retaliate because bullies are looking for a reaction. Don't answer phone calls, or reply to (or even read) text messages or comments.

·        Block cyberbullies. Most web services will allow you to block anyone whose behavior is inappropriate or threatening in any way. Check with the service— social networking, IM, cell phone—to find out how.

·        Save the evidence. Save text messages, emails, and other evidence of cyberbullying in case the authorities need it. 

Ano Awad

Ano Awad

Eliane Boutros

Eliane Boutros

إنها حصرون الواقعة في قضاء بشري ، تتجمع بيوتها المحافطة على نمط العمارة اللبنانيّة التقليدية معظمها مكلل بالقرميد الأحمر وسط محيط طبيعي يتكون من مرتفعات تغطي جهاتها الأربعة، وهي ترتفع نحو 1420 متراً عن سطح البحر وتبعد حوالي 108 كلم عن العاصمة بيروت وتبلغ مساحة أراضيها 1038 هكتاراً.

وهذه البلدة تعتبر من أجمل بلدات الإصطياف فقد غرست فيها أشجار الأرز(خشبه متين يصلح للنحت عــليه، ويدخل فـــي صناعات خشبيةأضافه إلى أن رائحته عطرة)  وذكية، والسرو(شجرة دائمة الخضره يصل ارتفاعها إلى 30متراً) والصنوبر(تعطي أشجار الصنوبر الصمغ ، و يستخرج من الصمغ زيت التربنتين، الذي يستعمل طبياً على مستوى اقل في صناعة المراهم ، و المادة اللاصقة في البلاستر)  والسنديان (هو  بطيءالنمو ولا يحمل ثمراً إلا بعد عشرين عاماً) والحور( هو ثلاثة أنواع: الأبيض، والأسود، والرجراج، ويصل محيط جذعها إلى حوالي 6 أمتار ونادرًا ما يزيد ارتفاعها على 17 مترًا) كما تنتشر في أرجائها مختلف أنواع الخضار من بقدونس وخس وملفوف وبندورة... كما أنها تضم ينابيع تنتشر في
رحابها الواسعة مما يجعل المقاهي والمطاعم التي تقدم الأطباق اللبنانية كثيفة فيجد السائح عند قدومه الى حصرون ما يتناسب مع رغباته في أجواء لبنانية مميزة.

وحصرون كلمة فينيقية تعني في اللغة العربية المكان المسور ، وقد عثر فيها على معبد وثني شيد على انقاضه كنيسة القديس أسيا القرن الثامن جددت في المراحل اللاحقة ويوجد أيضاً كنائس أخرى كنيسة القديس لابي، كنيسة القديسة حنة ومزارات عدة منها مزار القديس سمعان، مزار سيدة لورد، مزار ام العجائب...

ومن أهم عائلات حصرون نذكر: ابو سليمان، ابو الياس ـ ابو عيسى ، بولس، جبارة ، الحاج، زعرور، خليفة، جبارة، صليبا، فارس،غطاس، متى، مرعب، يونس ، يونان، شكور، شليطا، مطر، معربس... اضافة الى عائلات اخرى كان لها دور مهم في بلدة حصرون التي تحتضن حالياً مجلس بلدي اسس العام 1926.

Ziad Mikhael Akl

Ziad Mikhael Akl

Hope the best for all people in Hasroun who live it or who are in the 4 corners of the world.