Thirteen members of a Thai soccer team, including their coach, were rescued from Tham Luang cave after being trapped for nearly two weeks. EPA
Thirteen members of a Thai soccer team, including their coach, were rescued from Tham Luang cave after being trapped for nearly two weeks. EPA

Thai boys need support to accelerate their recovery



I write in reference to your moving editorial The boys rescued from the Thai cave should be given long-term care and support (July 11): the Thai cave survivors are children whose entire lives lie ahead of them. If books are written and films made about them, as reports have already suggested, a portion of the proceeds should go towards their education and rehabilitation. It transpires that three of the children and the coach are in fact stateless, without Thai citizenship.  The Thai government should be generous and grant them citizenship.

Moreover the young coach should not face trial for having walked into the cave with the children. The coach himself is a youngster at 25, an orphan and a former Buddhist monk. He too has suffered enough and should be spared any further pain. He did not even eat his tiny food ration in the cave, instead giving it to the children to keep them strong. He also taught them meditation, which helped the children to survive a macabre ordeal.

You have rightly compared the Thai cave saga with the Chilean miners’ crisis in 2010. Some of the miners have complained that although they inspired a book and a film, they received meagre remuneration.

Manchester United football club has done well to invite the children to Old Trafford, because such visits can accelerate rehabilitation. Others should follow suit.

Rajendra Aneja, Dubai

Kudos to Asia’s richest tycoon, Mukesh Ambani

I refer to your online article India's Mukesh Ambani to overtake Jack Ma as Asia's richest tycoon (July 14): the recent revelation that Reliance Industries chief executive Mukesh Ambani is overtaking Jack Ma as Asia's richest person, with more than $44 billion to his name is undeniably good news for India. Reliance Industries is known for its work in the oil and gas sector and telecommunications, which are strategic industries for India.

Built by his father Dhirubhai Ambani, the company’s tremendous recent growth is inspiring. Kudos to Mukesh Ambani.

K Ragavan, Denver

The story of the abandoned baby was heartbreaking

With reference to Ramola Talwar Badam's article Baby abandoned at birth in Dubai is reunited with mother in the Philippines (July 10),  I hope the mother, in leaving the child, found a a safe place at least where she would not be harmed until discovered.

It’s rather tragic that the mother had no other option, but to abandon the infant. It reminds me of a sad story from the 1920s. Poor child.

Chris Ryan, Abu Dhabi

A brilliant article cutting through the nonsense

I refer to Peter Hellyer's article Iceberg project belongs firmly in the realm of fiction (July 9): Mr Hellyer's was a brilliant piece and contained the most sense I've heard so far regarding this off-beat subject.

Name withheld by request

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

The%20specs%3A%202024%20Mercedes%20E200
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3E2.0-litre%20four-cyl%20turbo%20%2B%20mild%20hybrid%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E204hp%20at%205%2C800rpm%20%2B23hp%20hybrid%20boost%0D%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E320Nm%20at%201%2C800rpm%20%2B205Nm%20hybrid%20boost%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3E9-speed%20auto%0D%3Cbr%3E%3Cstrong%3EFuel%20consumption%3A%20%3C%2Fstrong%3E7.3L%2F100km%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3ENovember%2FDecember%0D%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3EFrom%20Dh205%2C000%20(estimate)%3C%2Fp%3E%0A