My Weblog

Articles, News, and More...

Safe Sex VS Safer Sex

For a time, the use of condoms and other contraceptives was often referred to as "safe sex". It was thought that, as long as you used condoms along with another method of birth control, you were virtually immune from sexually transmitted diseases (STDs) and pregnancy. Nowadays, the only type of safe sex is no sex at all.

What is Safe Sex?

When people speak of "safe sex" today, they are referring to abstinence. Abstaining from sex and sexual play is the only sure method to avoid catching an STD and to prevent an unplanned pregnancy. Although it may not prevent a pregnancy, having sex within a committed, monogamous, long-term relationship with someone who has tested free of any STDs is also generally considered to be safe sex.

So why isn’t using condoms along with other forms of birth control known as "safe sex" anymore but as "safer sex" instead? Because contraceptives can fail, resulting in pregnancy, and condoms cannot provide protection against all forms of STDs. However, condoms are still the only and best protection we have against most STDs. Therefore, it is important to use them every time you have sex.

What’s the Big Deal About STDs Anyway?

While some sexually transmitted diseases, like chlamydia, can be cured, others cannot. HIV is one of the most serious STDs out there and women are one of the fastest growing groups being infected. Moreover, according to UNICEF, half of all new HIV cases worldwide occur in people between the ages of 15 and 24. So if you’re young and sexually active, you’re automatically at a higher risk of being infected with HIV. Although it can be managed through medication, the HIV virus does eventually develop into AIDS leading to death. Other incurable STDs include human papillomavirus (HPV), which is the cause of genital warts and can lead to cervical cancer and even death,hepatitis B and herpes.

Sexually transmitted diseases are dangerous for anyone but they can have especially severe consequences in women. Many STDs can seriously damage your reproductive organs causing you to be infertile. Some, like HPV, have been linked to an increased risk of cervical cancer, a type of cancer that men do not need to worry about. Additionally, if you have an STD while you are pregnant, it is possible to pass the infection on to your baby causing her to become sick or possibly even die.

If you are sexually active, it is imperative that you use condoms each and every time you have sex even though they cannot protect you from every STD. Latex or polyurethane condoms are the most effective at protecting against STDs. However, they cannot provide protection against infections that are transmitted through skin-to-skin contact. Additionally, condoms can break or fall off during sex, putting you at risk of catching an STD. While it was once thought that condoms treated with spermicide helped to kill off STD infections and viruses, current research suggests that spermicides have no such effect. In fact, using spermicides multiple times throughout the day has actually been shown to increase your risk of STDs because the chemicals can irritate your vaginal lining thereby making it easier for an infection to get into your system.

Talking with Your Partner

When you are considering becoming sexually active with someone, talk to them about their sexual history. Remember, when you have sex with someone, you are having sex with every person they have ever had sex with. It is a good idea for both of you to go get tested for STDs so that you can be sure you are both free of any infections. However, some STDs can take as long as six months before they begin to affect you. If your partner has had sex with someone else in the last six months, it is a good idea to either put off having sex or use condoms until he can be retested.

If your partner refuses to get tested or has no desire to talk about his sexual history, you may want to reconsider your choice to have intercourse with him. Never feel guilty for asking about his sexual past. Your health, as well as his, is on the line and you both have a right to know what you’re getting into. Never allow yourself to be pressured, coerced or bullied into a sexual relationship. Do not hesitate to say no. If a your partner forces you to have sex after you’ve said no, that is rape and should be reported to the authorities.

Signs of an STD
If you notice any of the following symptoms, make an appointment with your doctor or gynecologist right away to be tested for STDs:

* Vaginal itching
* Burning sensation when you urinate
* Unusual vaginal discharge
* Blisters around the genital area
* General pain in the pelvic area

Source: epigee.org

Read More...
AddThis Social Bookmark Button

Internet

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANET. The original aim was to create a network that would allow users of a research computer at one university to be able to "talk to" research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.

Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of the total resources of the currently existing public telecommunication networks. Technically, what distinguishes the Internet is its use of a set of protocols called TCP/IP (for Transmission Control Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and the extranet, also make use of the TCP/IP protocol.

For many Internet users, electronic mail (e-mail) has practically replaced the Postal Service for short written transactions. Electronic mail is the most widely used application on the Net. You can also carry on live "conversations" with other computer users, using Internet Relay Chat (IRC). More recently, Internet telephony hardware and software allows real-time voice conversations.

The most widely used part of the Internet is the World Wide Web (often abbreviated "WWW" or called "the Web"). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web sites, certain words or phrases appear in text of a different color than the rest; often this text is also underlined. When you select one of these words or phrases, you will be transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that are "clickable." If you move the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that you can click and be transferred to another site.

Using the Web, you have access to millions of pages of information. Web browsing is done with a Web browser, the most popular of which are Microsoft Internet Explorer and Netscape Navigator. The appearance of a particular Web site may vary slightly depending on the browser you use. Also, later versions of a particular browser are able to render more "bells and whistles" such as animation, virtual reality, sound, and music files, than earlier versions.

Source: searchvb.techtarget.com

Read More...
AddThis Social Bookmark Button

Linux's History

Linux has a rich history. It is essential to understand Linux's history in order to understand the philosophy behind Linux's programming. This guide hopes to cover what Linux is really about, show you its history, why it was formed, and a brief description of its capabilities and how it operates.

What is Linux?

Linux is a freely distributed operating system that behaves like the Unix operating system. Linux was designed specifically for the PC platform and takes advantage of its design to give users comparable performance to high-end UNIX workstations. Many big-name companies have joined the Linux bandwagon such as IBM and Compaq, offering systems pre-installed with Linux. Also, many companies have started Linux packages, such as Red Hat, Corel, and Samba. However, they can only charge for services and documentation packaged with the Linux software. More and more businesses are using Linux as an efficient and more economical way to run their networks.

Linux is a complete multitasking, multi-user operating system that behaves like UNIX in terms of kernel behavior and peripheral support. Linux has all the features of UNIX and boasts of its open source code and mainly free utilities.

The Linux kernel was originally developed for the Intel 80386, which was developed with multitasking as one of its features. The kernel is the lowest-level core factor of the operating system. The kernel is the code that controls the interface between user programs and hardware devices, the scheduling of processes to achieve multitasking, and many other aspects of the system. The Linux kernel is a monolithic kernel; all the device drivers are part of the kernel proper. Despite the fact that most of Intel's CPUs are used with single-tasking MS-DOS, Linux makes good use of the advanced multitasking features built into the CPU's instruction set. Linux supports demand paging, which means that only the sections of a program that are necessary are read into RAM. Linux also offers support for copy-on-write, a process that if more than one copy of a particular application is loaded, all tasks can share the same memory. When large memory requirements are needed and only small amounts of physical RAM are available, Linux has another feature called swap space. Swap space allows pages of memory to be written to a reserved area of a disk and treated as an extension of physical memory. By moving pages between the swap space and RAM, Linux can, in effect, act as if it had much more physical RAM than it does, with the cost of some speed due to the hard drive's slower access. Linux also supports diverse file systems, as well as those compatible with DOS and OS/2. Linux's file system, ext2fs, is intended for best possible use of the disk.

The History of Linux

Linux is a freely distributable version of UNIX. UNIX is one of the most popular operating systems for networking worldwide because of its large support base and distribution. Linus Torvalds, who was then a student at the University of Helsinki in Finland, developed Linux in 1991. It was released for free on the Internet and generated the largest software-development phenomena of all time. Because of GNU software (GNU being an acronym for Gnu's Not UNIX) created by the Free Software Foundation, Linux has many utilities to offer. The Free Software Foundation offers royalty-free software to programmers and developers. From the very beginning, Linux has been entwined with GNU software. From 1991, Linux quickly developed on hackers' web pages as the alternative to Windows and the more expensive UNIX systems. When Red Hat released its commercial version of Linux packaged with tech support and documentation, the floodgates broke and the majority of the public became aware of Linux and its capabilities. Now more and more new users are willing to try Linux on their personal PCs and business users are willing to use Linux to run their networks. Linux has become the latest phenomenon to hit the PC software market.

Linux is a unique operating system in that it is an active participant in the Open Source Software movement. Linux is legally covered by the GNU General Public License, also known as GPL. Open Source software is free but is not in the public domain. It is not shareware either. GPL allows people to take free software and distribute their own versions of the software. However, the vendors who sell free software cannot restrict the rights of users who purchase the software. In other words, users who buy GPL software can make copies of it and distribute it free of charge or for a fee. Also, distributors of GPL software must make it clear that the software is covered by the GPL and must provide the complete source code for the software at no cost. Linux embodies the Open Source model. Open source applies to software for which the source code is freely available for anyone to download, alter, and redistribute. Linux is the perfect operating system for hackers because they can freely download newer versions of the Linux kernel or other Linux utilities of the Internet and instantly change its source code to fix any software bugs found. That way, bugs can be fixed in a matter of hours as opposed to days and weeks. Beta testers and code debuggers are unorganized and spread throughout the world, but surprisingly, they have managed to quickly debug Linux software efficiently and cooperate online through the use of the Internet.

Source: library.thinkquest.org

Read More...
AddThis Social Bookmark Button

Microsoft releases Silverlight 1.0, announces Linux support

Microsoft announced yesterday the official release of Silverlight 1.0, a versatile .NET development framework that makes it possible for developers to build web applications that incorporate rich media content and elaborate user interfaces. Although Silverlight support was initially only planned for Windows and Mac OS X, Microsoft has announced plans to extend full Silverlight support to the Linux operating system in collaboration with Novell.

Miguel de Icaza, Novell's lead Mono developer and vice president of developer platforms, revealed plans earlier this year to build Moonlight, an open-source Silverlight implementation for Linux that runs on top of Mono. Although de Icaza had initially planned to finish creating an early prototype by the end of the year, he and his team decided to shorten the timeline and attempt to create a working plugin in time for the MIX07 event in Paris in June. After an epic 20-day hackathon, during which a team of deeply committed Novell developers worked 12- to 16-hour days and produced tens of thousands of lines of code, a functioning Moonlight prototype was made available for download.

Microsoft now plans to work closely with Novell to ensure that Silverlight is fully supported on the Linux platform. In a blog entry, de Icaza discusses the scope of Microsoft's involvement in Novell's Silverlight development project. "We have had a cordial relationship with many developers at Microsoft for quite some time," de Icaza writes in his blog entry. "Today we are formalizing a collaboration between Microsoft and Novell with the explicit purpose of bringing Silverlight to Linux and do this in a fully supported way."

According to de Icaza, Microsoft will be providing Novell with access to Silverlight test suites to ensure compatibility with Microsoft's proprietary implementation along with additional documentation to help facilitate ongoing development and strong support for future versions, including the upcoming 1.1 release. Microsoft also plans to make binary video and audio codecs that are compatible with the open-source plug-in available for download to individual Moonlight users directly from the Microsoft web site. Since there are no intellectual property impediments limiting distribution of the plug-in itself, Novell plans to make Moonlight available to all Linux users—not just Novell enterprise customers—and will provide both RPM and DEB packages for inclusion in major Linux distributions as well as source code. Although Moonlight presently only supports Firefox on Linux, de Icaza and the Moonlight team hope to collaborate with developers to bring Moonlight support to other browsers and open-source operating systems.

The Mono development team is also working on additional projects that will augment Silverlight support on the Linux platform in other ways. For instance, Alan McGovern is actively developing Lunar Eclipse, an open-source Silverlight design tool for Linux and Mac OS X.

"A shift of tectonic proportions"
Ars spoke with de Icaza after the announcement to get additional details about this new collaborative agreement. "Until today, it was casual," de Icaza told Ars, referring to his team's relationship with Microsoft's Silverlight developers. "Today we signed the agreement in which we will get access to test suites, specifications and more."

We also asked de Icaza if he thinks that this latest move by Microsoft is indicative of an emerging trend within the company towards greater openness and collaboration with the open-source community. "I think this is a significant event," de Icaza replied. "I am not sure what is happening inside Microsoft, but the developer division is opening up like nobody else. They really seem to understand open-source, and they are changing Microsoft from the inside. This is a shift of tectonic proportions."

Microsoft's attitude towards Linux has evolved significantly in recent years, and the company's inconsistent position seems to reflect internal dissonance. Although there are some signs that the company is softening up, Microsoft still demonstrates less promising behaviors. The insights provided by de Icaza seem to indicate that there are a growing number of developers inside of Microsoft who recognize the value and necessity of collaboration with the open-source software community and have enough leverage to make a positive influence on company policy. If this trend continues to grow, we could see Microsoft taking a more active role in the open-source community and possibly opening more of its technologies.

Microsoft's new collaborative agreement will guarantee that Novell has the resources and documentation needed to ensure that Linux will have strong support for Silverlight going forward. Ongoing collaboration between Microsoft and Novell on the Moonlight project could also pressure Adobe to open up its Flash browser plug-in, which competes with Silverlight. Microsoft's announcement is likely to be welcomed by desktop Linux users and many in the web development community. It is also a strong indication that Novell's controversial efforts to work closely with Microsoft can produce technologies that truly benefit the broader Linux community.

Source: arstechnica.com

Read More...
AddThis Social Bookmark Button

20 Hidden Windows Vista Tools

The default installation of Windows Vista weighs in at approximately 8 GB. In fact, Microsoft's latest operating system won't even install with less than 15 GB of space available on the hard drive. This is valid for both the low-end and the high-end editions of the platform. A full Vista installation will take up no less than 40 times more hard disk space compared to Windows 95's 200 MB and five times more than Windows XP's 1.5 GB. Part of the reason why Vista hugs so much hard disk real estate space is the fact that the operating system brings to the table a plethora of built-in administrative tools that ship by default with the platform.

In this context, the term hidden, is not entirely accurate. Advanced users and system administrators have no problems tracking down and using the administrative tools in Vista. But at the same time, an average user could pass right by them, just because of their low footprint in the operating system's fabric, as they simply have a way to go by virtually undocumented and unnoticed. But this does not mean that the tools are not there, it just requires a bit of digging under the surface. And you will be surprised of how many long-time Windows users have failed to take a deeper look under the hood of the operating system, even if it would make their life so much easier.

You'll be surprised of what is lying beneath. But at the same time you have to understand that a large part of these utilities are not new to Vista, although they all suffered enhancements. Some of them are obviously survivors from older editions of Windows. But this is besides the point. You should at least be aware of the luxuriant resources within your grasp, provided of course that you are running Windows Vista. Also, while the tools exemplified in this article are to a certain degree common to all SKUs of Vista, you would do better to focus on the high-end editions of the operating system, such as Business, Enterprise and Ultimate, and less on Home Basic and Home Premium, as some items might be missing or limited in functionality on the latter two examples of the platform.

1. Task Manager

Right, I thought I would debut with something as common as the Start Menu. The Windows Task Manager can be launched via Ctrl + Shift + Esc, or by Alt + Ctrl + Delete, as well as by right clicking the Taskbar and choosing Task Manager from the options in the contextual menu that pops up. The Windows Task Manager in Vista is designed to run with standard user privileges, and as such, will not deliver a User Account Prompt. The tool will permit you to manage Applications, Processes, Services, and to monitor Performance, Networking and the active Users through the corresponding tabs. If you are looking to kill a program that is not responding, identify the process associated with a certain program or simply check the CPU cycles or the amount of system memory cached, then Task Manager is the simplest and most accessible tool.

2. Network and Sharing Center

"The Network and Sharing Center puts you in control of your network connectivity. It's a place where you can check your connection status, view your network visually, and troubleshoot connection problems. The Network and Sharing Center informs you about your network and verifies whether your PC can successfully access the Internet—then summarizes this info in the form of a Network Map," reads a fragment of Microsoft's description of the resource.

But the Network and Sharing Center is only the surface of the Windows Network Diagnostics tool in Windows Vista, an automated utility designed to identify, diagnose and resolve connectivity problems. And in its turn, the Windows Network Diagnostics tool is just a part of the Network Diagnostics Framework (NDF) in Vista. Every time you will run into connectivity issues, NDF can provide a way out. The Network and Sharing Center is located under Control Panel, Network and Internet.

3. Backup, Shadow Copies, System Restore

There is an intimate connection between backup, shadow copies, system restore and restore points in Windows Vista. And there are two locations that will permit you to both have a general perspective of the status of the capabilities mentioned and to configure them, the Backup Status and Configuration and the Backup and Restore Center. Both can be launched by entering "Backup" in the search box under the Start Menu.

Via the Backup Status and Configuration you will be able to manage automatic file backup and handle the settings, as well as perform advanced restore or a complete PC backup. The Backup and Restore Center offers basically the same functionality but is additionally focused on creating system restore point and activating the shadow copies’ features.

4. Windows BitLocker Drive Encryption

Available exclusively in Windows Vista Enterprise and Ultimate, Windows BitLocker Drive Encryption is designed to help ensure the privacy of sensitive data by encryption. Although the default configuration of BitLocker requires a Trust Platform Module, the fact of the matter is that TPMs are rare in use outside of corporate environments, but users will be able to use the tool nonetheless, although without some functionality. With Windows Vista SP1, the Redmond company will also allow users to encrypt additional volumes on top of the operating system drive, protected by default.

"During computer startup, if BitLocker detects a system condition that could represent a security risk (for example, disk errors, a change to the BIOS , or changes to any startup files), it will lock the drive and require a special BitLocker recovery password to unlock it. Make sure that you create this recovery password when you turn on BitLocker for the first time; otherwise, you could permanently lose access to your files", is the warning Microsoft provides with the use of BitLocker.

5. Program Compatibility Wizard

The Program Compatibility Wizard under Control Panel and Programs will permit you to use an older program with Windows Vista. The tool is designed to help users that are experiencing functionality issues with an application in Vista, although the problems were not there with a prior version of Windows. The wizard will detect all the programs installed, and also permit the selection and testing of compatibility settings. Everything from display settings, to desktop composition and to administrative privileges can be set through the wizard.

6. Microsoft Management Console 3.0

"Microsoft Management Console (MMC) hosts administrative tools that you can use to administer networks, computers, services, and other system components," reads an excerpt of the Redmond company's description of the resource. The Microsoft Management Console 3.0, also known as Console Root or Console 1, has been around since Windows 2000. You can open it by typing "mmc" in the Search box under the Start menu, in a Run dialog box or in a command prompt window. MMC is essentially not an administrative tool, as it does not perform any such tasks, but it does provide hosting for various components including: Local security Policy, Computer Management, Event Viewer, and the Reliability and Performance Monitor as snap-ins which can be added for local or remote computers on the network.

7. Computer Management

Computer Management is a collection of administrative components. Accessible by entering "Computer Management" in the Search box under Start Menu, you can find items placed in three categories: System Tools, Storage and Services and Applications. Computer Management comes with the Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups, the Reliability and Performance Monitor, Device Manager, Disk Management, as well as Services and WMI Control.

8. WMI - Windows Management Instrumentation

"Effective management of PC and server systems in an enterprise network benefits from well-instrumented computer software and hardware, which allow system components to be monitored and controlled, both locally and remotely. Microsoft is committed to simplifying instrumentation of hardware and software under Microsoft Windows operating systems. Microsoft is also committed to providing consistent access to this instrumentation for both Windows-based management systems and legacy management systems that are hosted in other environments. The foundations for manageability in Windows operating systems are Windows Management Instrumentation (WMI; formerly known as WBEM) and WMI extensions for Windows Driver Model," reveals the company's introduction on WMI.

9. Services

Typing "Services" in the Search box under the Start Menu will open the tool with exactly this name. Essentially, the utility will provide an exhaustive list of all the processes in Windows Vista complete with name, description, status and startup type. The console will allow you to stop, restart or start various services across the operating system, as well as getting an insight into all the properties of the services enumerated by the tool.

10. Disk Management

Disk Management in Windows Vista is under Control Panel, System and Maintenance, Administrative Tools, Computer Management, Storage. A breeze to navigate if you were to ask me. The system utility will help you manage partitions and hard disks. Disk initialization, creating volumes, and formatting with the FAT, FAT32, or NTFS file systems are all tasks offered by Disk Management.

11. Device Manager

"Device Manager provides you with a graphical view of the hardware that is installed on your computer. All devices communicate with Windows through a piece of software called a device driver. You can use Device Manager to install and update the drivers for your hardware devices, modify hardware settings for those devices, and troubleshoot problems", is the overview Microsoft provides of the tool. Device Manager permits users to modify hardware configuration settings, get a complete overview of all devices, perform device drivers installation and uninstallation actions, as well as enable and disable certain items.

12. Windows Reliability and Performance Monitor

Under Control Panel, System and Maintenance, Administrative Tools, the Windows Reliability and Performance Monitor is the big brother of the monitoring features provided by the Task Manager. The tool will offer a closer view at the CPU, the hard disk, Network activity and System Memory. Users can both monitor the system's performance in real time or choose to create logs of data collected and stored for further analysis.

13. Local Users and Groups

This is the perfect location to manage accounts in Windows Vista. You will be able to create and handle user accounts and the details related to them such as Groups and privileges. The Local Users and Groups console offers a location to activate the two built-in accounts that ship with Vista: Guest and Administrator. While Guest can be all but ignored, I am sure that the account for the Absolute Administrator of Vista is the kind of freedom some users will want.

14. Event Viewer

"The Event Viewer is a Microsoft Management Console (MMC) snap-in that enables you to browse and manage event logs. It is an indispensable tool for monitoring the health of systems and troubleshooting issues when they arise. Event Viewer enables you to perform the following tasks: view events from multiple event logs; save useful event filters as custom views that can be reused; schedule a task to run in response to an event and create and manage event subscriptions", reads the tool's overview.

15. Task Scheduler

The Task Scheduler is also hosted under Control Panel, System and Maintenance, Administrative Tools and the name is pretty much explanatory. You can use the tool to schedule automated tasks in concordance with a specific time or a certain event. The utility will also offer a complete library of scheduled tasks allowing you to delete unnecessary items, in addition to options such as run, disable and modify.

16. Memory Diagnostics Tool

Normally, you will access the Memory Diagnostics Tool via the Windows Vista installation disk. But there is also another way. The utility can be found under Control Panel, System and Maintenance, Administrative Tools and, when launched, it will offer to restart immediately and check for RAM problems, or analyze the system memory the next time the computer is started. This is a very useful tool that will identify and diagnose memory problems.

17. System Configuration

System Configuration can be launched by entering "msconfig" in the Search box under the Start menu. It will offer users five tabs and with them the possibility to manage the startup process, boot options, the services across Vista, a reduced list of start-up items as well as providing shortcuts to a range of tools in the operating system. Under the Tools tab, you will be able to find some more hidden Vista goodies such as Internet Protocol Configuration, UAC and easy access to the registry.

18. System Information

"System Information (also known as msinfo32.exe) shows details about your computer's hardware configuration, computer components, and software, including drivers," reads the general description of the tool. System Information offers users a view over System Summary, the Hardware Resources and the Software Environment. The tool will display information about the operating system and its general settings, hardware and programs. Just type "msinfo32.exe" in the Search box under the Start Menu in order to launch it.

19. Windows Firewall with Advanced Security

Windows Firewall with Advanced Security is a bit of a hidden gem in Windows Vista. Located under Control Panel, Administrative Tools the tool is a bundle between a host firewall and Ipsec. If you want control over packets for IPv4 and IPv6 traffic, then this utility is the right answer for you, no doubt about it. You will be able to configure rules that will then apply to all incoming and outgoing traffic.

20. Local Security Policy

Also placed under Control Panel, Administrative Tools, the Local Security Policy will allow you to configure policies for the Vista Accounts, Local Policies, Public Key Policies, Software Restrictions Policies, IP Security Policies on Local Computer and the Windows Firewall with Advanced Security.

Source: news.softpedia.com

Read More...
AddThis Social Bookmark Button

Night Eating Syndrome (NES) -- Sign Diagnose, Symptoms, Triggers, Prevention and Treatment

Do You Have Night-eating Syndrome?

* You eat 50 percent or more of your daily food intake after dinner
* You have no appetite for breakfast
* You have trouble falling and/or staying asleep
* When you wake up during the night you often eat
* The foods you eat at night are mostly carbohydrates

When you’re spending more time each night in the kitchen than in the bedroom, you may have a newly identified eating disorder. Called night-eating syndrome (NES), the condition is characterised by a lack of appetite for breakfast; the consumption of more than 50 percent of daily calories after the evening meal, and waking up, at least, once a night to consume high-carbohydrate snacks. To receive a diagnosis of NES, symptoms must have continued for a minimum of three months.

If you have any combination of these signs, consult your doctor.

What is Night Eating Syndrome?

A new eating disorder spells a nightmare for those who suffer from it. Night eating syndrome is an eating disorder that has only been recognized as such since 1999, and affects between 1 and 2% of the population. NES is also characterized as a sleeping disorder. NES is often accompanied by or confused with sleep-related eating disorder (SRED), although the two are distinct.

Night Eating Syndrome is a disorder where the affected individual wakes multiple times during the night and is unable to fall back asleep unless they eat something. Foods eaten during the binge are often high caloric in content and unhealthy. The night eating behavior seems totally beyond the effected individual's control. For these individuals, 35% or more of their calories are eaten after dinnertime. Following the night binge, the person is often not hungry in the morning. Individuals suffering from Night Eating

This is an ongoing, persistent behavior, unlike the occasional late snack or skipped meal that most people have from time to time. In fact, people with this disorder are often unaware of their nocturnal meals, although some feel they won't be able to sleep without eating first. ( Note: a person falls asleep more easily on a full stomach. ) Among those who are aware of their night eating, there is often an emotional component; the diet of the night eater is comfort food.

What are the symptoms or behavior of NES?

People who suffer from night eating syndrome generally:

* Skip breakfast, and go several hours after waking before their first meal.
* Consume at least half their calories after dinner. (Many sources would list this as after 9 or 10 pm; dessert is generally not included, if one is eaten. ). Late night binges almost always consist of carbohydrates. However, this eating is typically spread over several hours, which is not consistent with a typical eating binge as seen in other eating disorders.
* Suffer from depression or anxiety, often in connection with their eating habits. These night eating episodes typically bring guilt rather than hedonic enjoyment.
* Has trouble sleeping in general; see insomnia. Is more likely than the general public to sleepwalk.


To be considered a bona fide disorder, this pattern should continue for two months or more. Syndrome are often caught in the vicious cycle of binge eating during the night and eating less during the day.

Are there Specific Triggers for NES ?


Triggers for Night Eating Syndrome include

* depression
* anxiety
* interpersonal stressors
* boredom
* prolonged dieting
* body image dissatisfaction


Night eating may temporarily relieve the stress of these unwanted feelings, but for the night eater these episodes are unfortunately followed by feelings of guilt, shame, disgust, and further depression. For the person suffering from NES, the eating episodes usually occur in secret and any evidence is often hidden from others. Similar to Anorexics, Bulimics, and Compulsive Overeaters, individuals suffering from NES are often struggling and unhappy with their weight. It is estimated that up to one percent of the population may be suffering from NES. Like Anorexia Nervosa Bulimia Nervosa, and Compulsive Overeating, NES is a disease and cannot be cured with willpower alone.

How is NES different from Binge Eating and Bulimia?


It is different from binge eating and bulimia. Individuals with night eating disorder consume relatively small snacks (with high calorie content) at night but far more frequently. Individuals with binge eating disorder and/or bulimia have very large and infrequent binges.

Can NES be Treated?

Yes. If you suspect that a family member has NES. Suggest that your family member see an eating disorder expert. Be prepared for denial, resistance, and even anger. A doctor and/or a counselor can help them battle their eating disorder. Treatment involves counseling, and paying attention to medical and nutritional needs.

The treatment should be tailored to the individual and will vary according to both the severity of the disorder and the patient's particular problems, needs, and strengths.

NES tends to lead to weight gain; as many as 28% of those seeking gastric-bypass surgery were found to suffer from NES in one study. In fact, while sufferers are not always overweight, one in four people who are overweight by 100 lbs or more are thought to suffer from night eating syndrome. The disorder is accompanied by what sufferers describe as an uncontrolable desire to eat, akin to addiction, and is often treated chemically.

Therapy to increase the natural nocturnal rise in melatonin, reduce the body's adrenal stress response and raise leptin levels or improve leptin sensitivity are options that may help these patients overcome the disorder. Another key may involve the availability of tryptophan, an important amino acid, in the body. More than 70% of the nighttime eating to combat anxiety involved binging on carbohydrates. These foods are believed to increase the amount of tryptophan available for conversion to serotonin, the calming neurotransmitter in the brain that promotes an overall sense of well-being and, in turn, converts to melatonin.

The antidepressant drug Zoloft has shown some ability to help NES sufferers.

NOTE: Addressing hormonal and biochemical imbalances in patients with chronic eating and mood disorders can be crucial for uncovering fundamental causes and contributing factors that underlie cyclical, habitual patterns of insomnia, overeating, and depression.

From Many Source

Read More...
AddThis Social Bookmark Button