Sunday, November 8, 2009

Useful Tips for Buying Used Computers

In this modern era, high tech devices that are very expensive like the computers can be replaced with cheaper ones. Such cheap computers mostly come in the form of used computers. Used computers can be found in abundance in the used computer warehouses in various places, even in the local area of the prospective buyer’s residence. However there is no guarantee of quality when buying a used computer.

The buyer has to take his own personal risk in doing so. But, if the buyer is ready to spend some money in upgrading the level of the used computer and also some time checking the quality of the used computer before purchase, it will save him from loss. Used computers can save a lot of money for the buyer when compared to buying a new computer. There are many who cannot afford to buy a new computer like the students who do not have any source of income but definitely require computers. For such people, used computers come as a boon.

Also, used computers need not always be second hand computers. They can also be recertified or refurbished computers. Refurbished or recertified computers are those, which are checked for any faults, if any corrected and sold with a warranty ensuring the working condition of the computer to be perfect. Hence, such computers are considered to be the safest form of buying a used computer. Refurbished computers can be bought from many of the online stores at very less prices. Quality computer manufacturers also sell such kind of recertified or refurbished computers. However, certain measures need to be taken while buying such kind of computers.

The prime aspect to be considered while purchasing a used or refurbished computer is to look for a good branded one. There are various companies who sell used computers or refurbished computers. The main reasons for opting for a branded one is that it comes with a warranty and also the buyer can be sure that the parts used are of good quality.

While buying used or refurbished computers related software documents, licenses and paperwork have to be got from the seller as this will avoid stolen computers being passed off as used computers to the buyer. If possible working for some time on the used computer will determine its efficiency. Most of the reputed dealers would allow the purchaser to use the computer for a shorter period to check the quality before purchase.

While checking for the efficiency of the used computer, it is good to check if the booting process is smooth, as most of the problems occur during booting and also to check all the sound drivers, video, graphics, monitor, mouse, keyboard etc. CD drives and hard disks also need to be checked. Another aspect is the support system offered for the used computer whether technical or non-technical, support staff capabilities and the number of support staff which determine the quality of service offered. If the purchaser is not satisfied, he can very well think of another choice.


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Wednesday, November 4, 2009

Mission: CHANGE

It’s the second day of classes and I’m still stuck in my vacation moments. I’d still like to travel almost anywhere without thought of school projects left undone and without though of school obligations which leads to stress at some point.

As I sat sluggishly in one of my minor subjects, the teacher wrote something on the board that made me follow it until the last stroke was finished. It was one word that puts me in a dilemma most of the time- MISSION.

It was a flat piece of written art on the board but it struck me and left the biggest question that might change me forever once I find the answer. “What is my ultimate mission?” Most people wait for signs and others just don’t care. But there are those who would do everything to find their mission. What’s the fuss all about? Why do we have to know and find out if we will still turn to ashes someday?

Our ultimate purpose in this world is to find our mission, or purpose and our direction. As the juvenile members of the society, we have a mission of being heard and of making a CHANGE. We have the mission to be able to have a voice in every issue and discussion when it comes to both national and international concerns.

To create CHANGE amidst the turmoil and disasters.

To CHANGE ourselves to become better.

These changes are easy to say but it’s a work as big as the galaxies and we need battalions of people to be one to make change happen. That’s where the youth comes in!!!

On November 16-17 2009, YES2009 or the YOUTH ENGAGEMENT SUMMIT 2009 will be held and the CHANGE experience begins!

Sign up and join! You might win a FREE TRIP to Kuala Lumpur Malaysia. You will be joining 500 South East Asian Youth and meet icons of change.

TO JOIN Click the link below and ask others to join you too…
http://philippines.youthsays.com/seachange/go/s14

TO CHECK OUT THE YES2009 TRIP DETAILS Click the link:
http://blog.youthsays.com/seachange/yes2009-trip/

Deadline is extended until this Sunday. This is YOUR time to be heard. YOUR time and chance to make a change!!!

Join Now!

By: Widowed Patch, join her with her mission to change
Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Wednesday, October 28, 2009

Protect Yourself From Cyber Crime

One of the most powerful mediums of communication is the Internet and today we see almost everyone using it. Many transactions take place on the net which has resulted in the eruption of cyber crime. Though internet is the main platform used to commit cyber crimes, other communication devices such as computer networks and cell phones are also mediums of this type of crime.

Cyber crime may include activities such as computer hacking, child pornography, stalking, spam marketing, credit card fraud and identity theft. Releasing malware, spyware and viruses to steal information is also a part of cyber crime.

Here are a few tips which when followed can protect your sensitive financial or personal information.

If you are a member of online forums and communities, ensure you are very careful sharing your personal information. Predators on social networking sites such as Twitter, Facebook and MySpace can steal and use this information to stalk or harass you.

Ensure all your online transaction passwords are really difficult to guess and strong. It is a good idea changing your password on a frequent basis to avoid any problems.

Equip your computer with reliable antivirus software for maximum protection. If you are posting photographs on profiles, choose your picture with care. Ensure you do not post pictures that could harm your reputation.

Never leave your personal information details such as address, telephone numbers, passwords, account numbers and social security number lying around. Also ensure they are not placed on cell phones, mp3 players and multimedia devices.

The moment you receive your credit card bills and bank statements, check for any discrepancies. If you are keen on shopping online, choose a reliable and secure website. Ensure you get a free credit report yearly from the credit bureaus. This makes it easy for you to find out if someone is using your social security number unauthorized. If you do come across any cyber crimes, be sure to report to the authorities immediately


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Thursday, September 10, 2009

The Value of Google Adwords

Highly targeted traffic is one of the most important entities in the internet universe. Any website owner or administrator recognizes the importance of driving traffic to a website. The success of any website does not rely entirely on the site itself. You may have a terrific idea for a website, offer an excellent product or service, or have an exceptionally designed site with superb content, but if you do not use the right strategies to advertise, your site would not attract the high traffic you need. Attracting targeted traffic is a task that should be taken seriously for any site to succeed or make a profit. Fortunately, there are internet-marketing tools that help the website marketer to drive traffic to his website. One of the most significant, and effective, of these tools is Google's Adwords. Adwords is one of Google's advertising services.

How does Google Adwords work?

Google is the largest search engine on the web receiving over 200 million queries each day through its various services. As Google is the most popular search engine today, webmasters are keen on having their websites achieve a higher ranking in the search engine results it provides. A high ranking can mean high traffic for that website. The search engine results page is also a great venue for advertisers to promote a product or service through ads and links. Consequently, Google launched its Adwords service, as a way for businesses to advertise products and services to a targeted audience. Google Adwords can guarantee instant traffic. In this service, Google displays relevant text based ads within its search engine results page termed as "Sponsored Links". Whenever a particular keyword is searched on, these relevant links appear in a separate section giving excellent exposure to the sites listed.

How do you use Google Adwords? First, you have to open an account with the Google Adwords Service. Then, you should indicate your target language and country. This is important because you would not want your products advertised in countries where your product or service cannot be sold. Afterwards, you should now create an ad group. This involves designing the ad, selecting keywords and determining maximum cost per click that you are willing to spend and defining bid amounts. The most important step in creating a successful Adwords campaign is selecting an effective title tag that will catch the attention of your target audience. The title tag, generally a short phrase, is the most important part of your Adwords campaign so make sure that it is attractive and catchy. You should describe the website clearly and accurately. The most effective advertising conveys a clear message to the target audience. With a clear message, you will be attracting qualified leads, which can eventually convert to sale. Thus, the importance of selecting the right keywords cannot be overemphasized.

There are keyword variations you can adapt to reach more prospects. Using these varieties, misspellings and derivatives can help increase the chance of your ads being served. Broad match is targeting keywords in a loosely defined manner. Here, the ads appear based on the keywords that have been queried by other users as opposed to exact match, which calls for the keyword to match the query exactly. Meanwhile, a keyword phrase set to phrase match will only appear when the exact phrase is searched on. A negative keyword is helpful in filtering unrelated pages.

After you have decided on what title tag to use in your ad, you must now define a budget in order to maximize exposure. Google Adwords recommend a daily budget for each campaign. However, you should determine a budget that is suitable and affordable. You should also determine the maximum cost per click. Google will offer a recommended cost per click, but you do not have to stick with this. Usually, a number one position is not ideal as it can also attract unwanted traffic and useless clicks. A number two position is more preferred as it can filter useless clicks and provide traffic with a higher conversion rate.

To conclude, Google Adwords is an excellent strategy and tool in giving your site maximum exposure. Nevertheless, Google Adwords should not be your sole advertising campaign. It will definitely help you find the all-important, highly targeted traffic you need.


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Tuesday, September 1, 2009

Top Up Your Website With These 5 Tips

SEO stands for Search Engine Optimization, it means optimizing ones website in such way that the search engine will deem its contents more relevant than other websites towards a particular keywords searched by users. It demonstrates the links from other websites & analyzes the keywords to fit properly in a page that complement to each other in order to getting top ranking position.

There are following 5 tips which can help you to get your website ranked on the top position:-

1) Domain Name
Registration of a domain name is the first step one takes towards having a website. When you start thinking of having a website for your business, you must understand the importance of SEO from that stage only. Many people take domain names related to their corporate identity and others prefer to have shorter domain names. Search Engine give a lot of importance to domain names, hence you should include the main keyword in your domain name. For example, if you sell flowers in india and your company name is ABC florist private limited, I suggest you to take a domain like abcflowersindia.com. Or abcfloristindia.com. You can go for other TLDs as well if .com is not available.

2) Make your website Content Rich
While designing your website, most people focus more on graphics and animation and lesser on content. You can hire a content writer or if you can do it at your own, make your website content rich. As search engines are content hungry and also more content mean more number of keywords. Try to use text instead of images where ever possible and also use ALT tags for your images and give considerable importance to naming of your webpages, images and folders. You should name them including your keywords. For example, if there is a image of Tulip, instead giving it a name like a1.jpg, name it tulip.jpg, similarly your webpages names should include the keywords instead abc.html or a1.html etc.

Also organize your website into different pages avoid stuffing all the keywords and phrases into one page. Also attempt to avoid the use of tables, flash, frames & java script & commented text in your webpage.

3) Meta Tags
Meta tags are also an important section of your web pages, they describe what the web page is all about. Be very careful while defining them. Leaving them empty or keyword stuffing both is harmful for your webpages. Following are most important meta tags -

a) Title Tag
Instead of having a title like welcome to ABC Florist Pvt. Ltd., you should have title like Send Flowers to India, New Delhi, Mumbai, Banglore. Try to include your main keywords within your title tag.

b) Description
Description tag is the text which is displayed under the title on result page. Write here a nice description of your webpage, so that a user can have an idea about your website while searching it in the search engines.

c) Keywords
keyword Meta tag is very important but be very careful while defining them. Keywords should be relevant to the webpage and there should not keyword stuffing in the webpage.

4) Create a site map
It improves the efficiency of the web pages by searching its content easily. It provides relevant result by getting their index quickly. It helps in navigation of all pages includes in the website. With the help of site map search bots can easily crawl link pages. Also generate a google and yahoo site maps and submit them.

5) Increase your Links
Link popularity is measured by both the quantity and quality of sites that link to your website. The ranking of your website is based on the quality of links. Once your site is complete and running, Focus on getting links from other websites. You can easily generated links using the following :-
  1. Directory submission increases in the link popularity. It is fast and affordable way to get one-way links.
  2. Article submission is a powerful method to gaining quality one way incoming links to your website.
  3. Blogging is also good way to popularize your website and getting back links.
  4. Social book marking is a method to store, manage, search, and organize bookmarks of web page on the internet with the help of metadata.
  5. Reciprocal link building is exchanging links with the theme based website. It help you increasing your PR and back links.Make sure that the site you are exchanging has good ranking area & major search engines.


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Saturday, August 29, 2009

Finding Online Jobs

Are you looking for a work-at-home job? Have you searched online only to become frustrated and confused with the array of offerings? Are you weary of looking at site after site trying to make sense of what is real and what is a scam? How can you know whether or not a work-at-home offer is legitimate?

YOU SHOULD BEWARE OF THE FOLLOWING:

Sites that make outrageous claims about earning potentials; they should be considered scams.
  • Outdated listings containing phone numbers, links and/or email addresses that don't work.
  • Work-at-home sites and companies that claim to find you jobs but only sell you information on how you might be able to make money.
  • Pyramid or MLM schemes that try to get you to join them without selling a product or service.
  • Someone who asks for your money without answering your questions.
  • Use your common sense. If it sounds too good to be true, it probably is.
LEGITIMATE WORK AT HOME JOBS:

Legitimate work-at-home jobs can be found if you know where to look. There are thousands of companies worldwide, on and off the Internet, who are willing to pay people to work from home.

Some companies require you to spend some time working at home and some time in a regular office environment. There are many major corporations now that offer this kind of flexibility for their employees. You might even be able to convert your present job into a telecommuting one. It never hurts to ask your employer.

There are many companies that allow you to work exclusively from home. The many possibilities in this category can include customer service, telemarketing, writing, sales, and graphic design. These jobs are usually pay-per-project or commission-based and can be full-time or part-time. If they are full-time, they may provide benefits such as health insurance, vacation time, and retirement plans.

There are many web sites that specialize in work-at-home jobs. Some sites offer a list of job openings that can be viewed by category. These categories include, but are not limited to, accounting, administration, clerical, finance, graphic design, marketing, sales, web development, and writing.

Other work-at home sites provide only a list of companies that will hire employees to work from home. A lot of these websites also offer excellent information on starting and maintaining a home business.

Legitimate work-at-home opportunities require certain skills and experience just as any regular position would. For some of these jobs you will also need office equipment such as a computer, software, printer, Internet access, phone, and maybe a fax machine.

In your quest to find a job, you should research all opportunities available in the work-at-home industry, as well as other online resources. There are many sites where you can search for home-based work.

THE BEST PLACES TO SEARCH FOR HOME-BASED WORK:

  • Company and corporate websites - (IBM, Penney's, Disney, etc.) Whatever store, company or corporation you can think of, they will probably have a website. If they have a website, there will be a link for jobs.
  • General employment sites - (jobs.com, monster.com, careerbuilder.com, etc.) There are MANY websites for general job searches. Just do a search for 'jobs' and you're off!
  • Online Newspaper Classified Ads - Whatever newspaper you can think of, they will most likely have a website. You can also do a general search online for 'online newspaper classifieds' and you will get thousands of links.
  • Work-at-Home Directory listings - If you do a search for 'work at home' or 'work at home directories', you will receive thousands of possibilities.
  • Paid online survey sites listing companies seeking marketing research participants - Do a search for 'paid online surveys' and you will amazed by the number of results that come up!
The only requirements to finding a job online are time, commitment and perseverance. If you stick with it and stay focused, you WILL find something that works for you. There ARE jobs out there and there are good jobs out there. Hopefully, the tips listed above will help you in your quest to work from home.

Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Sunday, August 23, 2009

Jobs Hunting Through Social Networking Sites?

WASHINGTON (AFP) - – Nearly half of US employers research the online profiles of job candidates on social networks such as Facebook, MySpace or LinkedIn, according to a new survey.

Forty-five percent of the employers surveyed for CareerBuilder.com, the largest US online job site, said they use social networking sites to check on job candidates, up from just 22 percent in a survey conducted last year.

Another 11 percent said they plan to start using social networking sites for screening.

"As social networking grows increasingly pervasive, more employers are utilizing these sites to screen potential employees," CareerBuilder said in a statement.

It said job seekers should "be mindful of the information they post online."

CareerBuilder said that of those who conduct online searches as background checks on job candidates, 29 percent use Facebook, 26 percent use LinkedIn and 21 percent use MySpace.

Eleven percent search blogs while seven percent follow candidates on micro-blogging service Twitter.

Thirty-five percent of those surveyed said they have found content on a social network that caused them not to hire a candidate, CareerBuilder said.

Examples included "provocative or inappropriate photographs or information" or content about drinking or using drugs.

Other reasons cited were badmouthing a previous employer, co-workers or clients, poor communication skills, making discriminatory comments, lying about qualifications or sharing confidential information from a previous employer.

Information found on social networking profiles was not always a negative factor in finding a job.

Eighteen percent of employers said they have found content on social networking sites that caused them to hire the candidate, CareerBuilder said.

Some profiles "provided a good feel for the candidates personality" or supported their professional qualifications while others demonstrated creativity or solid communication skills.

Rosemary Haefner, vice president of human resources at CareerBuilder, recommended that candidates "clean up digital dirt" before beginning a job search by removing photos, content and links which could hurt their chances.

The survey of 2,667 hiring managers and human resource professionals was conducted by Harris Interactive between May 22 and June 10. It has a sampling error of plus or minus 1.9 percentage points.

Source: Yahoo News!


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Sunday, August 9, 2009

Free e-books offerings

NEW YORK - James Patterson's latest best seller, "The Angel Experiment," is a little different from his usual hits. The novel isn't new; it came out four years ago. Readers aren't picking it up at bookstores, but mostly on the Kindle site at Amazon.com.

And the price is low even for an old release: $0.00.

"I like the notion of introducing people to one book, while promoting the sales of another," says the prolific and mega-selling author (and co-author) of numerous thrillers." His Kindle download is the first book of Patterson's "Maximum Ride" young adult series.

"We've given away thousands of free e-copies," Patterson said. "`Maximum Ride' is big already and we think it could be a lot bigger. That requires getting people to read it."

Patterson is among the biggest brands added to the growing list of free e-book offerings. Over the past few months, top sellers on the Kindle — with downloads in the tens of thousands, authors and publishers say — have included such public domain titles as "Pride and Prejudice" and "The Adventures of Sherlock Holmes," and novels by Jennifer Stevenson and Greg Keyes.

In recent days, the top three Kindle sellers have been free books: Patterson's, Joseph Finder's "Paranoia" and Keyes' "The Briar King."

"There's always going to be someone who wants free things. What we're trying to do is link free with paid," Maja Thomas, senior vice president of digital media at Patterson's publisher, the Hachette Book Group, said. "It's like priming the pump."

"What we like to do is make the first book in a series free, usually a series that has multiple books," said Scott Shannon, publisher of the Del Rey/Spectra imprint at Random House, Inc., which published Keyes' fantasy novel.

Shannon said Del Rey has had especially good luck with Naomi Novik's "Temeraire" fantasy series after offering the first book for free. He said sales for the other Temeraire novels increased by more than 1,000 percent. "It's been stunning," he said.

Publishers and authors have been nervous that the standard cost for electronic editions of new releases, just under $10, will take away sales from the more expensive hardcovers and set an unrealistically low price for the future. They are concerned, but open-minded, about free books, which present a chance and a challenge: Readers may buy other books, or, they may simply seek more free titles.

"It's a huge hot-button topic we've been discussing within our division and at the corporate level," Shannon said. "We have had phenomenal success with using free books to get people to buy others by an author. But in the long term, we have to guard the market. We have to make sure people understand that time and energy goes into writing a book."

"Consumers love free — free is a good price. But the opportunity they present to publishers is to experiment, and I stress experiment," Ellie Hirschhorn, Simon & Schuster's chief digital officer, said.

The dominant e-book seller Amazon.com has been aggressive about keeping prices low, and has given free e-books high visibility by including them on the Kindle best-seller list. A leading rival, Sony, does not include free works among its best sellers, although some free books have popular downloads.

"We do withhold them from the best-seller list, so that it's an accurate reflection of what people are actually buying," says Sony eBook store director Chris Smythe.

In an e-mail statement about free ebooks, Amazon.com spokeswoman Cinthia Portugal, said, "We work hard to provide customers with the best value possible and pass savings on to them whenever possible." Portugal added that Amazon includes free books among its top sellers because the list is "based on customer orders — customers are still ordering these books, they just have a price tag of $0.00."

David Bailey, 56, a systems analyst in Tacoma, Wash., is the kind of customer publishers and authors want to get. He has downloaded free texts by Kelly Link, Scott Sigler and others, but has then purchased other books by those authors, sometimes "just to support them."

One of Bailey's free downloads was Finder's "Paranoia," a thriller first published in 2004. Finder, whose "Vanished" comes out Aug. 18, said he initially saw the free offering as a "no lose" deal since "Paranoia" wasn't selling many copies anyway and sales for his other books, including "Power Play" and "Killer Instinct," have gone up. But, noticing all the free best sellers on the Kindle, he wondered if readers will get used to not paying.

"I get a lot of e-mails from people, saying, `I hadn't even heard of you until I read your free book.' So no question, it does bring in free riders," Finder said. "But I'm also increasingly concerned. There are so many free e-books that basically you could stuff your Kindle or Sony Reader with free books and never have to buy anything."


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Saturday, July 4, 2009

Porn Continues to Plague iPhone Apps Store

Just one week after pulling an X-rated iPhone app offering photos of nude women, Apple has yet again found itself fighting off attempts to upload mobile porn.

An image of a teen girl, purported to be 15 years old who is topless and mostly bottomless appeared in the free app BeautyMeter, which lets users upload photos of themselves that are then rated by others, according to Wired magazine. The app is like an iPhone version of the rating site Hot or Not.

As of Wednesday afternoon, Wired said the app (including the same teen image) was still available in Apple's App store. But on Thursday, it appeared that Apple had removed it.

Funnymals, BeautyMeter's developer, and Apple did not immediately respond to requests for comment from ABCNews.com.

But in a note dated July 2 on Funnymals' Web site, the developer said that because of " inappropriate content upload we hardened our review process so the release time can be higher since now. As described in our terms and conditions, NO nude content is allowed (bikini content is allowed)."

Another note on the site says, "We don't review each uploaded photo exclusively but from time to time we will clean up."


Last week, after photos of nude women started appearing in the app Hottest Girls, the blogosphere lit up in disbelief.

The application previously displayed photos of women in lingerie and bikinis. But about a week after Apple unveiled a new operating system that includes parental controls that could filter out explicit content, the developers took off what was left of the clothes on the women, and turned up the heat on their product's content.

Read the rest of the story about Apple Porn Apps

Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Thursday, May 21, 2009

Aliens and UFO, are they really existing?

Many of us does not believe on these fictional endoparasitoid extraterrestrial species that is the primary antagonist of the Alien film series. Its existence remains hypothetical, because there is no credible evidence of extraterrestrial life which has been generally accepted by the mainstream scientific community. And yet, need to be proven by bare naked eye.

On the other hand, there's what we called UFO (unidentified flying object). UFO is the popular term for any aerial phenomenon whose cause cannot be easily or immediately determined which is more or like similar to Aliens. Both military and civilian research show that a significant majority of UFO sightings are identified after further investigation, either explicitly or indirectly through the presence of clear and simple explanatory factors, or the Occam's Razor.

The video compilation includes many of NASA UFO encounters/sightings that have been archived by Luna Cognita Productions over the years. All of these examples (with the exception of the second-to-last one) were captured on film by NASA astronauts or Russian Cosmonauts over the past half-century - showing many amazing examples from different eras - Gemini, Apollo, Apollo/Soyuz Test Project, Skylab, STS, the ISS, plus a couple Russian-source additions from their unmanned Zond and Mir Space Station programs as well thrown in to round things out.




Dr. Michio Kaku, a theoretical physicist specializing in string field theory, and a futurist, will help us to open our minds to our so called, science fictions.



Dr. Kaku appeared in the short documentary Obsessed & Scientific. The film is about the possibility of time travel and the people who dream about it. It has appeared at the Montreal World Film Festival and is in developmental talks about becoming a feature. He also appeared in the ABC documentary "UFOs: Seeing Is Believing," where he suggested that while he believes it is extremely unlikely that extraterrestrials have ever actually visited Earth, we must keep our minds open to the possible existence of civilizations a million years ahead of us in technology, where entirely new avenues of physics open up. He also discussed the future of interstellar exploration and alien life in the Discovery Channel special Alien Planet as one of the multiple speakers who co-hosted the show, and Einstein's Theory of Relativity on The History Channel.


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Friday, May 8, 2009

Online Bash Shell For Beginners



If you want to learn Linux bash shell commands in a fun way this is the place for you.

This website provides Unix-like virtual online bash shell command line interface where you can try out bash commands easily online in a web browser without the fear of installing Linux.

Once you gets your hands over bash shell commands you can easily move on to Linux because the knowledge of bash shell commands are essential for operating any Linux distro to its full potential.

Online Bash Shell

Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Friday, March 27, 2009

CDR-King 12” Tablet Review by Nurses & Geeks

For some of you who doesn’t know about tablet, it is an input device used by artists which allows one to draw a picture onto a computer screen without having to utilize a mouse or keyboard.

A tablet consists of a flat tablet and some sort of drawing device, usually either a pen or stylus. It may also be referred to as a drawing tablet or drawing pad. While the graphics tablet is most suited for artists and those who want the natural feel of a pen-like object to manipulate the cursor on their screen, non-artists may find them useful as well.

The smooth flow of a graphics tablet can be refreshing for those who find the mouse to be a jerky input device, and repetitive stress injuries such as carpal tunnel syndrome are less likely when using a graphics tablet.

Wacom Bamboo on Dell Latitude D830

It’s a Wacom Bamboo on a Dell Latitude D830 from Ken Schaefer’s Wacom Review. The tablet is quite small (about 19cm on each edge), thin (<1cm) and weighs about 300 grams. It has four buttons at the top (illuminated in blue) which can be programmed, as well as a little touchpad which allows scrolling up/down in windows using a motion similar to the click wheel in an iPod. Price is over $100 or over 4000Php (Philippine Peso). On the other hand, if you’re looking for a starter, low price, and fully featured alternative tablet, I recommend, CDR-King 12.1″ Slim Tablet.




CDR-King 12


Read the rest of the Nurses & Geeks' CDR-King 12” Tablet Review

Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Wednesday, March 25, 2009

Assessing Internet Security Risk, Part One: What is Risk Assessment?

The Internet, like the Wild West of old, is an uncharted new world, full of fresh and exciting opportunities. However, like the Wild West, the Internet is also fraught with new threats and obstacles; dangers the average businessman and home user hasn't even begun to understand. But I don’t have to tell you this. You’ve heard that exact speech at just about every single security conference or seminar you’ve ever attended, usually accompanied by a veritable array of slides and graphs demonstrating exactly how serious the threat is and how many millions of dollars your company stands to loose. The “death toll” statistic are then almost always followed by a sales pitch for some or other product that’s supposed to make it all go away. Yeah right.

Am I saying the threat isn’t real? Am I saying the statistics aren’t true? No. What I’m saying is that many users fail to see what relevance any of this has to themselves and their company. Should the fact that e-Bay supposedly spent $120,000 dollars recovering from Mafia Boy's DDoS attack really have an impact on the reader's corporate IT policy? Perhaps not.

And yet, users can't afford to ignore these facts completely. That would be just plain dumb. What they need to do is to recognize that there are new threats and challenges and, like the other threats and challenges that businesses have always known, these need to be met and managed. No need to panic. No need to spend any money. Yet.

What users really need to do is to understand what the specific risks are that their company or home network faces from being connected to the Internet. In the same way that you don't borrow your business strategy from e-Bay, you probably shouldn't borrow your IT security strategy from them either. You need to develop an IT security strategy to meet your unique needs. You understand your company's own unique risk profile.

As with so many other things in life, the key to effective information security is to work smarter, not harder. And in this case, working smarter means investing your valuable time, money and human resources on addressing the specific problems that are the most likely to cause the most damage. The math is really quite simple. But before you can do the sums, you have to identify the variables. Here are some of the questions you'll have to ask yourself:

  • What are the resources - Information & Information Systems - I'm actually interested in protecting?
  • What is the value of those resources, monetary or otherwise?
  • What are the all the possible threats that that those resources face?
  • What is the likelihood of those threats being realized?
  • What would be the impact of those threats on my business or personal life, if they were realized?>

Having answered the five questions above, you can then investigate mechanisms (both technical and procedural) that might address those risks, and then weigh up the cost of each possible solution against the potential impact of the threat. Once again, the math is simple: if the cost of the solution is higher then the potential financial impact of the risk (or risks) being addressed, then one may need to investigate other solutions, consider accepting and living with a part of the risk, or accepting and living with the risk completely.

This article is the first of a series that is designed to help readers to answer questions three and four in the context of Internet-connected systems: What are the threats that my Internet-connected systems face and what are the chances of those threats being realized. Over the next few weeks we will explore the thinking around Internet Security Assessments, not only why they are done, but also how they are done. By the end of this series you should understand how performing an Internet security assessment can contribute to an effective information security strategy, what you should expect from such an assessment and even how you could go about performing such an assessment yourself.

The Reasoning Behind Security Assessments

Background

An Internet Security Assessment is about understanding the risks that your company faces from being connected to the Internet. As already discussed, we go through this exercise in order to effectively decide how to spend time, money and human resources on information security. In this way our security expenditure can be requirement driven, not technology driven. In other words, we implement controls because we know that they’re needed, not just because the technology is available. Some firms refer to security assessments as ethical hacking or penetration testing. Although I also use these terms, I see them as referring to something completely different than risk assessment and thus do not see their use as appropriate in this context.

Security Assessments vs Risk Analysis

Later in this article, I'll show you a diagram of what is know as the "security life cycle", a depiction of the concept that security is a continual cycle with a number of distinct phases being repeated on an ongoing basis. You'll notice that this cycle distinguishes between a risk analysis and a security assessment. You may even have come across both terms before and wondered at the distinction. It's not my intention to argue semantics here. Indeed, I'm not even convinced that there is universal consensus on the precise definition of each term. Here's how I see it, briefly: A risk analysis is typically performed early in the security cycle. It's a business-oriented process that views risk and threats from a financial perspective and helps you to determine the best security strategy. Security assessments are performed periodically throughout the cycle. They view risk from a technical perspective and help to measure the efficacy of your security strategy. The primary focus of this paper is on this kind of assessment.

Internal vs External Assessments

I have further limited this paper to a discussion of Internet Security Assessments. Let me point out right from the start that this is only a part of the picture. An Internet security assessment can consist of one or both of two things: an internal assessment and an external assessment. The company for which I work distinguishes between the two in the following way:

"An external assessment is also known as perimeter testing and can be loosely defined as testing that is launched from outside the perimeter of the private network. This kind of testing emulates the threat from hackers and other external parties and is often concerned with breaching firewalls and other forms of perimeter security.

On the other hand, in internal testing the analyst is located somewhere within the perimeter of the private network and emulates the threat experienced from internal staff, consultants, disgruntled employees, or, in the event of unauthorized physical access or a compromise of the perimeter security. These internal threats comprise more then 60% of the total threat portfolio."

Although an Internet assessment is attractive because it is finite and answers a direct question, the following should be noted at the outset:

  1. An Internet assessment will not identify all the risks to your information resources. Areas that are clearly not addressed include the following:
  2. Threats from within the trusted environment;
  3. Threats from RAS and other external connections; and,
  4. Threats from your extranet and connections to 3rd parties.
  5. There are other ways of assessing risk, without doing a technical assessment.

Although it's beyond the scope of this discussion, the scope of an Internet Assessment can easily be expanded to include areas like RAS and the Extranet (which is why we actually refer to the service as an external assessment). However, even with the limited scope, there are a number of strong reasons for performing an Internet Security Assessment.

But first, let's remind ourselves why we want to do an assessment in the first place.

Reasons for performing a Technical Security Assessment

I've often thought, at the end of a security assessment project, that I probably could have advised the customer without having to perform the entire analysis. Internet installations are generally fairly similar and one sees the same mistakes being made at different installations all over the world. And yet I haven't quite given up on the idea. There are a number or reasons for my continued faith in technical assessments.

Firstly, a technical assessment allows me to fully familiarize myself with the customer's architecture. By the time the assessment is finished, I usually understand the client's Internet architecture at least as well they do, often even better. This puts me in a unique position to offer then real and useful advice and ongoing technical support.

The technical familiarity I've acquired also very often buys me the respect of the customer's technical personnel. That, in turn, puts me in an even better position to advise them. Because our clients themselves are often non-technical people, such as risk managers and financial managers, it is essential that we also win the trust and respect of the technical team. Penetration testing, a later phase in the assessment methodology during which we actually attempt to breach security and compromise the customer's systems, is particularly effective in this regard. It's hard for someone to argue that their security is sufficient when you've already clearly demonstrated that it can be compromised. The fact that our findings are based on a formal assessment methodology lends weight to the recommendations we make.

Sometimes an organization needs an objective assessment from an independent third party is necessary to convince others that they are taking security seriously. This is becoming more of an issue in certain sectors, where government, shareholders and other regulatory authorities are expecting companies to provide proof of proper information security.

Moreover, the fact is that a properly executed assessment may very well identify problems that otherwise may have gone unnoticed. A single small finger-fault in your firewall configuration may be all that's needed by an attacker and a thorough technical assessment may be the only way of determining this.

But most importantly, an assessment introduces objectivity. With the overwhelming number of security products and vendors in the market, it's important that security-conscious organizations and individuals spend money for the right reasons. A good assessment should help you to understand and prioritize your security requirements, allowing you to invest resources effectively. Very often, the most serious requirements will not be addressed by the simple acquisition of more technology, and it's important for the customer to understand that.

Actually, this last point is nothing new and security assessments have been seen as an important phase in the security lifecycle for as long as there has been information security theory. One version of the lifecycle looks like this:

The Security Lifecycle


The Security Lifecycle

Notice how the assessment phases (threat/risk analysis and security assessment) are the first and last step in the process. The analysis is used to identify what needs to be done, and the assessment is used to measure how effective the other phases in the cycle have been. A number of companies are even starting to use the outcome of these repeated assessments to measure the performance of their technical personnel. Some companies even use security assessments as a key performance area for regular personnel. Now there's an interesting idea.

Reasons for performing an Internet Security Assessment

Hopefully I've convinced you now of the value of a technical security assessment. But I've also said that this paper is limited to a discussion of Internet security assessments only. Does it make sense to focus on one area of your system like that? Actually, no. But Rome wasn't built in a day, and a complete assessment of a large environment will typically need to be broken up into a number of distinct and manageable phases. The Internet is only one of a number of different areas we could examine. However, Internet-connected systems are the single area we assess more than any other. And, given limited time and resources, it is sometimes the only area we consider for clients. Here is a summary of the reasons that companies still perform Internet security assessments:

  1. Internet systems are an obvious part of the problem: Given the almost overwhelming size of the complete information security problem, it's often hard to know where to start. Internet systems are very often a clearly defined subset of the complete infrastructure and can be easily isolated, analyzed and secured. Although we realize that this only a small part piece in a much larger puzzle, it very certainly is a piece. If we can confirm that the Internet systems are secure many managers feel "Whew, at least that's out of my hair."

  2. The Internet is a unique network: The tools and methodologies that we apply in analyzing Internet security are different from those we use when looking at "internal" spaces like WANs, LANs and Extranets. For this reason we tend to see an Internet assessment as a separate body of work from the rest of the assessment and tackle it separately.

  3. Internet systems are an obvious target: Attack via the Internet is by no means the only threat your company faces, but it is a clear and obvious threat and one would be foolish to ignore it. And, just as you want to be sure you've locked your front door, you want to be sure you've secured your connections to the Internet. The threat of attack via the Internet is easily identified, tested and eliminated. We test our Internet security because then we can know that it has been done and move on.

  4. Internet systems are a high-profile target: It smarts to be hacked from the Internet. Even though the financial impact of such an attack is often smaller then other forms of attack, a defaced Web site and other forms of Internet attack can often do huge damage to your company's reputation. For this reason we want to know that our Internet security has been taken care of.

  5. Internet systems are often beyond our control: The Internet began its life a utopian exercise in community collaboration. Although this early utopianism has long since evaporated and the Internet has now developed in a battlefield for new-world commerce, there are still a rather scary number of uncontrolled inter-dependencies that make it possible for your company to operate on the Internet. The magical routing of IP packets from one network to the next is one example of this. The mapping of machine names to IP addresses via the Domain Name System is another. Yet we have no real control over these systems. They are critical to the safe operation of our Internet infrastructure and yet their security is beyond our control. Similarly, we have no control over when new vulnerabilities will be discovered in our Internet technologies. Quite simply, the only defense we have is to regularly assess this infrastructure for safe and secure operation. This is probably more true for the Internet then for other areas of your infrastructure.


Conclusion

In this section I've tried to convince you of the value of doing a technical risk assessment and to explain why we often consider the Internet systems separately from the rest of the infrastructure. In the next installment in this series, I'll give you an overview of the steps that we follow in performing this kind of assessment. The methodology is designed to ensure that our work is complete and consistent.


By: Charl van der Walt on Security Focus


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Thursday, March 19, 2009

AMD lawyer: Intel would 'like us dead'

In the wake of the latest kerfuffle between Advanced Micro Devices and Intel, AMD's chief counsel seized the moment to sound off on a primal fear at his company: Intel is bent on its destruction. Intel, of course, doesn't quite see it that way.

After Intel accused AMD on Monday of breaching a 2001 patent cross-license agreement with Intel, AMD's top lawyer had some choice words for its bigger rival.

In a phone interview Tuesday, AMD general counsel Harry Wolin refuted Intel's claim that the AMD manufacturing spin-off Globalfoundries is not a subsidiary--and thus cannot legally use Intel intellectual property--and talked more broadly about Intel's tactics.

Intel's ultimate goal, Wolin believes, is to crush rivals into oblivion. "In their perfect world, we wouldn't exist. If they had to deal with the government every now and then, that's fine, and they're still extracting monopoly profits from the industry," he said.

Wolin doesn't buy into the oft-repeated theory that Intel needs AMD to keep the industry honest and to keep the U.S. government at bay. "I don't agree with the premise that they have to have us and they think they have to have us. I think they would absolutely like us dead," Wolin said.

The Dickensian depiction of AMD as the impoverished, distressed victim of Intel's bullying and manipulation is inaccurate and, more importantly, misses the relevant point, according to Intel spokesman Chuck Mulloy. "It's nice of them to try to speak for us. AMD has been a competitor for almost 40 years in one form or another. This is not about AMD going away," he said. "This is about our rights and AMD's rights under the patent cross-license agreement."

Ashok Kumar, an analyst at investment bank Collins Stewart, said the premise of a remorselessly predatory Intel set on killing off its rivals is attention-getting but not that realistic.

"Could Intel put them out of business? Probably. But is it a likely outcome? I don't think so," he said. "Because they'll get a lot of significant push back from the OEMs (PC makers). The OEMs will essentially be making a beeline to Washington, D.C."

Intel contends this is a very localized dispute about whether Globalfoundries is a subsidiary or not, and not a manufactured issue "to distract the world from the global antitrust scrutiny (Intel) faces," as AMD said in a statement Monday. "AMD cannot unilaterally extend Intel's licensing rights to a third party without Intel's consent," said Bruce Sewell, senior vice president and general counsel for Intel, in a statement on Monday. Intel maintains the issue is that Globalfoundries is 34.2 percent owned by AMD and 65.8 percent-plus owned by Advanced Technology Investment Co., an investment company. So, in effect, Globalfoundries is not an AMD subsidiary.

Wrong, AMD says. It is not about ownership. AMD has met the conditions that qualify it as a subsidiary. "It requires that AMD originally contributed at least 50 percent of the assets. If you look at the fact that we've thrown in the German factories, we've thrown in the people, we've thrown in the technology, we've thrown in the intellectual property. I don't think there's any credible argument that says we haven't thrown in more than 50 percent of this. It says nothing about owning. It says you have to originally contribute 50 percent of the assets," Wolin said.

And what happens from here?

"Let's say the parties end up in a lawsuit at the end of 60 days," Wolin said. (Intel says it will terminate AMD's rights and licenses under the cross license in 60 days if the alleged breach has not been corrected.) "Well, you know, that lawsuit doesn't come to court for years and wouldn't come to court until well after the antitrust suit would come to court, which is currently scheduled for February of next year," according to Wolin.

Intel says the next step is mediation, where Globalfoundries is brought to the table. If this doesn't resolve the issue, then they would both be off to the races and the lawsuits would begin.


Source: CNET News

Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Friday, March 6, 2009

Koobface, Other Worms Target Facebook Friends (NewsFactor)

- As Facebook works to make itself more relevant and timely for its growing member base with a profile page makeover, attackers seem to be working overtime to steal the identities of the friends, fans and brands that connect though the social-networking site.

Indeed, Facebook has seen five different security threats in the past week. According to Trend Micro, four new hoax applications are attempting to trick members into divulging their usernames and passwords. And a new variant of the Koobface worm is running wild on the site, installing malware on the computers of victims who click on a link to a fake YouTube video.

The Koobface worm is dangerous. It can be dropped by other malware and downloaded unknowingly by a user when visiting malicious Web sites, Trend Micro reports. When attackers execute the malware, it searches for cookies created by online social networks. The latest variant is targeting Facebook, but earlier variants have also plagued MySpace.

Koobface's Wicked Agenda

Once Koobface finds the social-networking cookies, it makes a DNS query to check IP addresses that correspond to remote domains. Trend Micro explains that those servers can send and receive information about the affected machine. Once connected, the malicious user can remotely perform commands on the victim's machine.

"Once cookies related to the monitored social-networking Web sites are located, it connects to these Web sites using the user log-in session stored in the cookies. It then navigates through pages to search for the user's friends. If a friend has been located, it sends an HTTP POST request to the server," Trend Micro reports.

Ultimately, the worm's agenda is to transform the victim's computer into a zombie and form botnets for malicious purposes. Koobface attempts to do this by composing a message and sending it to the user's friends. The message contains a link to a Web site where a copy of the worm can be downloaded by unsuspecting friends. And the cycle repeats itself.

An Attractive Face(book)

Malware authors are investing more energy in Facebook and other social-networking sites because that effort pays off, according to Michael Argast, a security analyst at Sophos. Facebook alone has more than 175 million users, which makes it an attractive target.

"Many computer users have been conditioned not to open an attachment from an e-mail or click a link found within, but won't think twice about checking out a hot new video linked to by a trusted friend on Facebook," Argast said.

Argast called the Koobface worm a mix of something old and something new. The new is using social networks as a method to spread malware. The old is using fake codec Trojans linked to a saucy video to induce the user to install the malware.


Read the rest of the article here:
Yahoo News


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Sunday, January 11, 2009

Latest Pinay Scandal

And you're bringing your fantasies here don't you? Sad to say this is not the right post for you again. This is the second post to fight these real porno sites promoting Filipina Scandals. If you're interested about this battle, join with us. I'm urging everyone to join this campaign especially the female bloggers and to those who believe on justice.

How will the campaign work?
The Google Trends can show how internet surfers demand a single keyword, for example the keyword "Sex Scandal". With this Google application, we are able to study how these keywords drive traffic on a scale of time. So imagine if the good sites will promote keywords similar to the keywords the real pornography sites promote, Google, Yahoo and other search engines will help us to drive the traffic out of them.

How this will benefit your blog?
As what i've told you earlier, keywords such as "Sex Scandal, Download Scandal Pinay, Pinay University Scandal" are those keywords driving more and more traffic to the real pornography sites. Why? Of course there are so many unhappy-liberated surfers looking for fun to satisfy their fantasies. What will this post do is to drive traffic on to your site. So, lesser real porn sites will appear in Google and Yahoo! Don't worry about the Google Adsense TOS (Terms of Condition), you're not promoting the real pornography.

How will i join this campaign?
You could simply discuss this thread on the comment section. Link back to this post and comment, informing you're joining. By this, you'll be given credit by us joining the campaign, the women involved on any scandalous video clips, and your families.

So, who are you people at my side?!


You might want this related post:
Naked Hot Pinay Sex Scandal
Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Thursday, January 8, 2009

Asian Pride, Historical RP Cyberterrorism

In November 16, 2001, Saturday, a group of so-called "white hat" Filipino hackers called Asian Pride launched a series of attacks on several local websites. The hackers, who apparently are based outside the Philippines, claim they are out to teach Filipino local Internet service providers (ISPs) a lesson in Internet security.

Calling it "the 4 o Clock project," Asian Pride, which claims to be composed of Filipino freelance security enthusiasts, was allegedly able to intrude into the servers of local ISP Mosaic Communications Inc (MosCom), uploading executable programs that would eventually modify a website’s main page.

White hat hackers claim that they are not out to cause any damage, but only hack into systems to test vulnerabilities.

Jerry Liao, operations manager of local portal Brainshare Online at www.brainshare.com.ph, claimed that they were among the first to report the incident to MosCom administrators on Saturday morning. A mirror of the defaced website is at http://www.expressions.com.ph/img/10101/asianpride/www.brainshare.com.ph.htm.

Apart from Brainshare Online, dcoder claimed that the group also defaced the website of broadcast giant ABS-CBN.

For his part, Liao said that they detected problems around 7:30 a.m. on Saturday.

According to Liao, Brainshare Online was restored around 7:45 a.m. that day, but at around 9 a.m. he received error messages, as the server could not be accessed.

In a separate interview, Robertson Chiang, vice president for technology of MosCom, said that the ISP decided to direct surfers to another server after getting reports of the hacking incident on Saturday.

"It was only an attack on one machine. It was an old one where we host a few dozen clients," Chiang said.



Asked how the hackers were able to get into the server, he said that considering it was an "old Unix machine," they were not able to patch security holes.
"It was partly our fault," he added.

Liao said that MosCom was able to restore "normal" operations between 6 to 7 p.m. on Saturday.

"The server was completely reformatted using a new system that already includes the security patches," Chiang said.

MosCom is now conducting an inventory of all its servers, to check if similar security problems exist in the "new" systems.

"It’s been a long time, I hope you can wake those arrogant administrators, specially those with PH-CERT (Philippine Computer Emergency Response Team). We tried to warn and help them on securing (local) websites, but they just laughed at us and ignored us," the hacker codenamed dcoder told INQ7.net via e-mail.

"So my fellow haxor keech of FDN [Filipino developers network] organized a Project called 4'Oclock, where we will be defacing all ph sites, to give this administrators a wake up call.
"Well I can't explain much right now, but if you read all the messages on the selected defacements, it might give you an idea on what we are fighting for," dcoder added.
In the mirror of the defaced Brainshare Online website, Asian Pride explained:
"The 4 o Clock project is a system composed of Filipino freelance security enthusiasts that aims to disseminate the importance of Information security here in the Philippines. This team has conducted a survey, scanning random (website) hosts and informing the people (Internet service provider administrators) about (problems). (We then) encourage them to fix their servers. We have no intention, however, of destroying, and/or hijacking information, ... We are not paid to do this."

Liao somehow agreed. He observed that while the hackers were able to "penetrate" MosCom’s servers, they did not delete or destroy any files.

The hackers uploaded programs (executable files) that will only run when a website administrator begins uploading the new main page (index) into the server. The program blocks anyone from uploading into the server, but prompts the user to download a new file, which includes a message explaining the purpose of the defacement.

Liao, however, said that the hackers also offered the option not to accept the new file. "It sort of gives you permission to delete the files," he added.

Asian Pride claimed that "more than 90 percent of (MosCom’s) servers can be exploited through common vulnerabilities, therefore jeopardizing the security of their clients as well as their office."

The group said that they have warned administrators of MosCom of vulnerabilities, "but were just subjected to insult, despite their professional approach."

"They scorned us with their witty remarks, bragging about their degrees, and that we knew less. So what did they accomplish? Absolutely nothing productive," the group added.
Local websites hit by hackers were hosted at the virtual server with the address at kenshin.mozcom.com.

The list of websites that the group claimed to have attacked on Saturday may be seen at http://www.expressions.com.ph/img/10101/asianpride/kenshin.mozcom.com.txt and http://www.expressions.com.ph/img/10101/asianpride/.

"This ain’t no kiddy games, and were ain’t your average script kiddies. We broke into these sites not randomly, but we targeted specific sites, specially those sites that are 100% secure..." Asian Pride said.

The hackers are out to target other Philippine ISPs, and dcoder claimed that the next victim might be PhilOnline.

MosCom’s Chiang, however, insisted that these hackers are only script kiddies.
Other alleged members of the group include "sch1z0phr3n1c," "jollogs," "jayv[ee," "marcster," "batusai_slasher," and "keech."

http://progsystem.free.fr/hackingnews.htm#Hackers%20launch


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

What is really Web 2.0 and Mashup means?

Andy Gutmans, Zend co-founder, will going to talk about what is really Web 2.0 means. Furthermore, the executive editor of ZDNet, David Berlin, will discuss the mashup.



What is a mashup?





Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Wednesday, January 7, 2009

The Idea of Online Business

Some Filipinos think online money making is tough in Philippines? No. There are a lot of ideas to make online money from not only Philippines but from anywhere in the world . You can find advertisements on online money making opportunities and businesses that you can do right from Philippines. But remember, the Internet not only connects your business to big traffic, but also your servers to Internet hackers and malware. Thats why Internet security is so vital. So, along with some ideas on making money online, you also need some knowledge on how to improve the Internet security of your business.

Online Money making ideas
Online money making can be quite tough for people in Philippines, especially when they don't want to spend money or if they don't have a website. But ideas do exist if you want to go the “free” way. You cannot expect to get rich in a flash nevertheless there are some online money making opportunities to help you make money without any investment. One way is to start a blog on free platforms like Wordpress or Blogger, and add Google Adsense or other pay per click ads. You can add niche content on something you are passionate about and also something people are looking for, so that more traffic is driven to your blog.


You will be paid for every click on these ads. You can also market affiliate links to earn money. There are some free affiliate link programs available. All you have to do is market the link through advertisement techniques like forums, blogging, articles etc. You will be paid when people buy through your link Another online money making technique is taking part in free online paid surveys. Businesses conduct surveys to know about trends in a particular locality like our own Philippines for example. You can make use of these surveys, but don't expect big money.

Advertisement Ideas for better Traffic
If you own an online money making website, you should not only concentrate on design but also on traffic. You need traffic to get repeat visitors. Remember, repeat visitors are the ones who are going to buy something from your website. You can achieve this by using good advertisement methods like journals, web, news media and magazines. The goal of the advertisement should be to persuade the visitor on the legitimacy of your business. Another way of improving your online money making efforts is including well written and related articles on your website. You can also take part in forums to meet fellow Internet entrepreneurs from Philippines and share business ideas. Remember, traffic is directly proportional to the profit you are going to get.

Ideas for improving Internet security
If you have employees working for your e-business, you need to educate them about viruses, Trojans and others that can attack via the web. You can use web filters to prevent your employees from visiting harmful websites. Also install a centrally controllable anti-virus software and Firewall to prevent worms from web traffic accessing your computer.


Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo

Friday, January 2, 2009

Pinay Sex Scandal, Hot as Always

Well oh well, you’ve just visited this post. First off, im gonna tell you that you’re on a wrong site and wrong bad time. This post has nothing to do with Naked Hot Pinay Sex Scandal! I am also joining the battle against the real porn sites promoting Pinay Scandal materials such as Pinay Sex Scandal Video, Pinay Sex Scandal DVD, and other related materials.

More on Sex, and Pinay Scandal related stories:

  • Looking for Free Pinay Sex
  • Pinay Sex Video (Vedio), An Experiment
  • Sex with You
  • Sex, Sexual Romance, Sexual Intercourse: Questions Answered
  • S.E.X. - Lyfe Jennings
  • Cool Sex Lamp
  • Sex Freak
  • No Blog No Sex Policy
  • The Right Timing for Sex to Have Baby
  • How To Enjoy Sex
  • Looking for Wife
  • Hentai Movie
  • Hentai Download
  • Hentai Popular
  • Hentai New Release
  • Naruto Hentai
  • Naruto Hentai images
  • Pinay Sex Video (Vedio), An Experiment
  • Pinay Teen Sex Experiment On First Stage of Success
  • Maasin City Scandal, Online Show
  • Pinay Teens
  • University Scandal
  • Club Sex
  • Cute Teen Rape
  • Boso
  • Stripped
  • Nip Slipped
  • Dressing Room
  • Pinay Scandal Experiment Success and Clarification
  • How Important Are The Visits Made by Porn-Loving Guys To This Blog?
  • Porn Traffic Is Now Dying
How will this help?

Simple, it will help take control the real porn sites offering to view to these Pinay Scandals by giving to Google and other search engines like Yahoo the most trafficked sites. By the way, this is a repost from my Ideas Loading Blog
Continue reading this article...

Feel free to share it!

Technorati Digg it Add to Del.icio.us Stumble It! Add to Google Bookmarks Twitthis Reddit Blinklist Furl Live Yahoo