Because there's more to life than one's self, status or material things.
(for those dealing with real-life issues and who enjoy participating in stimulating discussions on issues and ideas, crave the thrill of geographic, mental and spiritual exploration and discovery and value local and global community, belonging and old and new friendships)
Are popularity, accomplishment, recognition, respect, wealth, power, fame, even religion not cutting it? Have you tried all the world’s got to offer and in doing so come up empty and unsatisfied? Feel like there's nowhere to turn? How to make your life explode with relevance.
Was Jesus just a man who married Mary Magdalene? Has the church been hiding information from us for years about Jesus? Don't decide too quickly. Examine the evidence first.
Think conclusive cases can't be made for the Bible and Jesus' claim to be the God/Man Messiah? You'd be surprised. The overwhelming mountain of factual, historical evidence is too compelling, too convincing to be ignored.
ATTENTION: If you want to avoid leaving private data entered for online purchases (usernames, passwords, names, phone numbers, addresses and credit card numbers) on your hard drive or removable medium after forgetting to reboot your virtual OS or securely erase the data, I strongly recommend doing the following two things: skip
Encrypt your virtual operating system's (or virtual machine's) image with TrueCrypt (free) and for additional security, store it on a removable medium. skip
Complete step 7, including storing your private data on an encrypted USB key or dongle (a secure thumb drive) and your encryption keys and web account passwords in secure* login and form fillers that protect against key loggers and installing an antiscreenlogger. Then follow the steps below to set up and maintain a private and secure virtual OS.
(* no web form filler is secure if the login page is unencrypted - http versus https - or a screen logger is installed on your system)
If you have Mac OS, the Safari browser ''protects your personal information on shared or public Macs when surfing the Web. Go ahead and check your bank account and .Mac email at the library or shop for birthday presents on the family Mac.
Using Safari's new Private Browsing feature, no information about where you visit on the Web, personal information you enter or pages you visit are saved or cached. It's as if you were never there.'' - Apple Computer, Inc.
If you've been saving private data on your hard drive, especially in unencrypted form, or the previous owner did, if there was one, securely erase your whole hard drive. Otherwise, skip this step.
If you prefer saving your private data on your hard drive instead of on removable media (not recommended), create separate partitions for your operating system and personal files (for Windows, create NTFS partitions - they're more secure than FAT16 or FAT32).
Because a newly-installed Windows system can become infected and corrupted by malware within only a few minutes of going online, especially with a broadband connection because your IP number never changes, I strongly recommend downloading all of the following software you choose to use first and saving them on a removable medium, before installing Windows.
Make sure you include the lastest drivers for your hardware. (drivers are usually located in the support section of each company's web site - if not, check driverguide.com)
Do a clean installation of Windows XP Pro, Windows Vista or an alternative operating system. (a virtual operating system won't work without a real, host operating system)
I recommend WindizUpdate for Windows users, instead of Microsoft's WindowsUpdate service, because unneeded updates can corrupt or disable Windows, and unlike WindowsUpdate, WindizUpdate only lists updates for software and services on your system.
Virtualization software, combined with behavior and whitelist HIPS, antirootkit software and operating system updates, will help reduce your computer's vulnerability to threats to about 1 tenth of 1 percent*.
Because of that and a virtual machine's ability to return a system to its original, healthy state, it also makes antimalware software pretty much unnecessary. But if you still prefer being extra safe, install the following software, scan often and install updates when available. skip
To be safe, I recommend using the following antirootkit software as well to check for rootkits which may have bypassed your HIPS program.
WARNING: Removing a rootkit may corrupt and disable your operating system, and destroy personal data in the process. I strongly recommend reformatting and reinstalling Windows instead, if you want to keep using Windows. Otherwise, you might want to consider taking this opportunity to switch to an alternative and more secure operating system.
Install one of the following virtualization (CPU speed) or emulation (slow or very slow) software combinations: skip
WARNING: Installing software and working in your virtual OS for long periods of time without running a HIPS and / or HIDS could, if your virtual OS were infected, infect others' computers and you could lose private data to identity thieves, predators and others interested in your private data. I strongly recommend running a HIPS and a HIDS on either your host operating system, your virtual OS, or both.