Skip to main content

Fatal floods hit southern China

At least 14 people have been killed in raging flood waters that have swept through south-western Guizhou province.

Scores of people are missing, and tens of thousands have left their homes ahead of more flooding.

Roads, bridges and hundreds of homes and cars have been destroyed in the onslaught.

The floods toll, reported by the state news agency Xinhua, comes after months of crop-destroying drought in the centre and north of the country.

The provincial civil affairs office in Guizhou said that floods have hit 11 cities and counties since 3 June.

At least 270,000 people have been affected, 45,000 evacuated and 3,000 stranded, said Xinhua.

Before the deluge

Some areas along the Yangtze River have suffered their worst drought in half a century.

Even with the rain - and more is forecast in the coming days - officials have warned that the crop shortages and dislocation caused by drought will remain severe.

Large swathes of China have had almost no rain since October, affecting millions of hectares of crops and leaving many short of drinking water.

Analysts say crop shortages in China could affect prices around the world.

The country's central bank is offering emergency loans for drought-relief projects in northern, central and eastern areas.

Officials are trying to calm fears over shortages, saying the country has enough in reserve to meet demand.

But food prices have been rising quickly in China for months.

Comments

Popular posts from this blog

கவர்ச்சிக் கன்னிகளின் அந்தரங்கம்

 

இடுப்பழகை கண்டு மயங்கி மார்பழகில் விழுந்தெழும்பியவரின் நிலை

  இடுப்பழகை கண்டு மயங்கி மார்பழகில் விழுந்தெழும்பியவரின் நிலை கவலைக்கிடம்

Strong passwords: How to create and use them (2)

Password strategies to avoid Some common methods used to create passwords are easy to guess by criminals. To avoid weak, easy-to-guess passwords: • Avoid sequences or repeated characters. "12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not help make secure passwords. • Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd". But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password. • Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. T