Wednesday, February 29, 2012

Discovering Light out of the Dark

Wednesday, February 29, 2012 0
Up,Up in the sky, outside the range of our Earth’s surface, lies the never-ending bewildering voluminous world of the universe where any ordinary people cannot decipher. 

 It’s family consisting of the matchless planets, sand-in-numbers stars, massive asteroids and comets, and other puzzling-undiscovered things that are awaiting to be discovered that make up the entire cosmos were all majestically-shaped and fabricated that magnetized every inquisitive mind of humanity.

It requires an interesting and scrupulous mind, a lot of time, too much effort, technologically-created machines and tools and loads of patience to be able to scrutinize it from its easily-discovered stuff up to its microscopic details.

Thanks to some useful and attainable instruments that made the impossible things for accustomed people to be possible to have a glimpse on what’s ahead beyond the world where we are walking in.

Biggest Telescope in the Country

In the Philippines, PAGASA Astronomical Observatory is equipped with a 45-cm computer-based telescope which is donated by the Japanese Government through its Cultural Grant-Aid Program and also the biggest ever acquired operational telescope by the PAGASA. It is used in the observation of variable stars.

The observatory has two other telescopes ( 10” and 7” Meade refracting telescopes ) being exercise for stargazing and telescoping session purposes, which visitors can use during their visits.

Stargazing and Planet Hunting 

As the sky started to paint the open air with its reddish-orange color, the sun announced its farewell to end the day. This moment marks the coming of the different astronomy enthusiasts from various parts of Metro and sometimes, from far provinces just to witnessed the glorious phenomenon occurring in the outside world.

If the sky condition will authorize, planet Jupiter can be seen in the Western part. And as the surroundings began to faint, Mercury and Venus can be catch by our eyes through the telescope. In the Eastern part, planet Mars was present and as the clock ticks at around 11 PM, the striking rings of Saturn will blow you up. 

Different constellations and its corresponding stars can also be distinguished. Carina nebula, Capela, the three stars forming equilateral and isosceles triangle, the Tres Marias and bright stars like Vega and Sirius were also in attendance during stargazing.  

Event Lecturers

The skyrocketing knowledge and countless experiences of the lecturers of PAGASA also added an extra spice for the activities. Their know-it-all personality will uplift your sense of eagerness and fascination regarding the field. Their words of wisdom and encyclopedic vocabulary concerning the heavenly bodies were deeply dumbfounding.  

Universe: A Magical Infinite World Needed to be Studied 

Truly, the world lying behind the world that we already knew is undeniably monumental, broad and really far from our own. Sometimes, other people might say and conclude that this area is not anymore worthy to be study or observe because of its distance. But, the most crucial thing people usually fail to understand is that there are outnumber events and occurrences in outer space that will definitely affects our way of living here on Earth.

The universe is undoubtedly a magical feature created by the Almighty. It has a room for every impossibilities, a door leading to undefined things and a window for every questionable and unexplained things and creature.

Therefore, it demands a futuristic point of view, open-minded analyzing of matters, perseverance, passion, eagerness, patience and a keen insight to peruse and balance out things.

Monday, February 27, 2012

Files in the Sky

Monday, February 27, 2012 0
Since technological breakthrough embraces the society, various ways of making life easier have been its aim. From paper works need not type writers, photos edited in just a sitting, periodicals lay-out in a click, digits processed in a second to the documents kept within the boundary of the sky without limits.
Google Docs serves as a collaborative tool for editing amongst in real time. Documents can be shared, opened, and edited by multiple users at the same time. Users cannot be notified of changes, but the application can notify users when a comment or discussion is made or replied to, facilitating collaboration. There is no way to highlight changes made by a particular editor in real time during a writing session, nor a way to jump to the changes made.
Google Docs originated from two separate products, Writely and Google Spreadsheets. Writely was a web-based word processor created by the software company Upstartle and launched in August 2005. Spreadsheets, launched as Google Labs Spreadsheets on June 6, 2006,originated from the acquisition of the XL2Web product by 2Web Technologies. Writely's original features included a collaborative text editing suite and access controls. Menus, keyboard shortcuts, and dialog boxes are similar to what users may expect in a desktop word processor such as Microsoft Word or Writer.

Google Docs is Google's "software as a service" office suite. Documents, spreadsheets, presentations can be created with Google Docs, imported through the web interface, or sent via email. Documents can be saved to a user's local computer in a variety of formats (ODF, HTML, PDF, RTF, Text, Microsoft Office).
Documents are automatically saved to Google's servers to prevent data loss, and a revision history is automatically kept so past edits may be viewed (although this only works for adjacent revisions, and there is currently no way to find and isolate changes in long documents.).
Documents can be tagged and archived for organizational purposes. The service is officially supported on recent versions of the Firefox, Internet Explorer, Safari and Chrome browsers running on Microsoft Windows, Apple OS X, and Linux operating systems.

1 GB of storage is included for free. Currently additional storage costs per year are: 20 GB-$5, 80 GB-$20, etc. up to 16 TB.
Individual documents may not exceed 1 GB as of 13 January 2010, embedded images must not exceed 2 MB each, and spreadsheets are limited to 256 columns, 400,000 rows, and 200 sheets.
In September 2009, an equation editor was added which allows rendering in LaTeX format. However, Google Docs lacks an equation numbering feature. Find and Replace is available, and although there was no ability to do the search in a reverse direction in the original release, the newest version of Google Docs allows reverse search and reverse replace.

Supported file formats
Google Docs supports 15 file formats:
  • Microsoft Word (.DOC and .DOCX)
  • Microsoft Excel (.XLS and .XLSX)
  • Microsoft PowerPoint (.PPT and .PPTX)
  • OpenDocument Format (.ODT and .ODS)
  • Adobe Portable Document Format (.PDF)
  • Apple Pages (.PAGES)
  • Adobe Illustrator (.AI)
  • Adobe Photoshop (.PSD)
  • Tagged Image File Format (.TIFF)
  • Autodesk AutoCad (.DXF)
  • Scalable Vector Graphics (.SVG)
  • PostScript (.EPS, .PS)
  • Fonts (.TTF, .OTF)
  • XML Paper Specification (.XPS)
  • Archive file types (.ZIP and .RAR)

Data safety and privacy
On-line document storage and processing are unsuitable for use by governments or commercial organisations due to data security issues and national interests, especially when sensitive or confidential data is involved.
On March 10, 2009, Google reported, for example, that a bug in Google Docs had allowed unintended access to some private documents. It was believed that 0.05% of all documents stored via the service were affected by the bug. Google claims the bug has now been fixed.

Sunday, February 26, 2012


Sunday, February 26, 2012 0
If there is one subject that every computer user, no matter what their level of technical expertise, needs to be aware of, it is how to protect their computer from the damage a virus can bring. As computers become more and more integral to our lives, the importance of virus protection will only grow.
The fact is that every computer is vulnerable to viruses, from the smallest home computer to the largest business computer network. If you use a computer you need virus protection – it is that simple. Unfortunately, many people fail to take this important security step, and that means that there are probably hundreds of thousands of computers running with no virus protection whatsoever.

Importance of a Firewall and Antivirus Software 
Computer security is an integral part of maintaining security in your life and in your work. An intruder able to break into your computer may find access to some very secure information including passwords, bank account information, and social security numbers. Thankfully, most computers have can be protected by installing a firewall and antivirus software.


The firewall protects computers from unauthorized users by carefully checking all messages on the Internet. Firewall techniques include the packet filter, application gateway, circuit level gateway and proxy server, all of which screen potential users for damaging behaviors. The packet filter, for example, looks closely at each packet using the network to determine if it is safe or unsafe, accepting or rejecting each packet. Application gateway screens FTP and Telnet servers, and circuit-level gateway searches TCP and UDP connections. Both block the servers and connections that may not be safe. Finally, the proxy server hides the network address–which when the address is known can allow criminals to hack your computer. Hiding the network address thereby protects your computer from possible harm.

Antivirus Software

Another important security software, antivirus software, protects the computer from viruses. Although the firewall can decrease susceptibility to internet communications, some viruses may still be able to sneak through. For this reason, antivirus software is an important part of the security package. Working by blocking known viruses and variations of known viruses, antivirus software protects the computer from attack.Also able to test packets for viruses by running them through a sandbox, the antivirus tests can determine if a packet leans toward harmful activities. Viruses, however, are ever-changing, and software updates and add-ons may be continuously necessary for complete virus control.

Together, a firewall and antivirus software can block intruders, test packets, deter viruses and protect your computer from cyber criminals, safeguarding your computer and your information.

The Top Ten Antivirus Software
With so many antivirus software programs that sprang up nowadays, we’ve compiled them for an easier and reliable guide that can help your computer safe against viruses and other malicious software. These top ten antivirus programs are capable of protecting your computer from dangerous virus, spyware, trojans and other forms of malware. Also, these are fully compatible with Windows XP, Windows Vista and Windows 7. Some of these are also compatible with MAC operating system and mobile devices.

#1 BitDefender Antivirus
BitDefender offers top of the line antivirus software for desktop computers, notebooks, MAC computers and mobile devices and that's why it is the #1 antivirus in our top ten antivirus list. BitDefender Antivirus 2012 is one among the most recommended software for home and small business computers. The antivirus uses advanced technology algorithms and methods to identify security risks and blocks threats even before they try to harm your computer. It is used by millions of computer users worldwide and also, the price of the antivirus software is quite affordable. This is the reason it is the #1 antivirus in our top ten antivirus ranking.
Advanced Features:
The BitDefender Antivirus offers these advanced proactive protection features:•         
Antivirus software protects against known and new viruses and other malware using industry-leading technology.
The real-time scanning feature constantly scans web, email and instant messenger activity to keep your computer safe.
Protects against harmful spyware by blocking spyware software that try to track your surfing habits.
Guard your instant messaging conversations by providing real-time scanning while you are chating with your friends.
The new version has improved speed and shorter scans, without affecting system performance.    
 Free email, chat, phone and forum support. 
Specialized tech support over the phone for free.

#2 Vipre Antivirus 

Vipre Antivirus 2012 is the latest version of the award-winning fast Vipre antivirus. Just like ESET, Vipre offers a fast antivirus software for home computers and home office computer users. Their software provides maximum protection while staying easy on system resources, it does not slow down the computer while scanning and/or updating definitions. Also, a great feature of their antivirus software is the Malware Detection which constantly checks your computer and while you browse or navigate over the internet. If Vipre finds any harmful website links, it flags them to inform the user of the potential risks involved. Users can then avoid harmful websites and web pages to keep themselves safe. Vipre antivirus 2012 is power packed with amazing features and we concluded that Vipre takes the #2 spot in our top ten antivirus programs list.

Advanced Features:
Vipre Antivirus advanced features:•         
High speed scanning performance with NEW enhanced virus scanner.•         
Powerful Malware Detector that keeps scanning computer and web pages and informs you of the potential risks before you click a bad link.•         
Malware Detector applies safety ratings to your Google, Bing/MSN and Yahoo search results•         
Constant updates to ensure that your Vipre antivirus software is updated with latest virus definitions.•         Silent, quick updates in the background, without disturbing you and without getting in your way.•         
VIPRE's all-new anti-rootkit technology finds and disables malicious hidden processes, threats, modules, services, files, Alternate Data Streams (ADS), or registry keys on a user's system.

#3 Perfect Antivirus
 Raxco Software, makers of the award-winning PerfectDisk disk defrag and optimization tool, introduced PerfectAntivirus 2012 this year. With the never-ending threat of viruses, malware and spyware posed to all Web users, this utility is a welcome addition to Raxco’s tool set for novice users, power users, gamers, photographers and videographers. The security program provides all-round protection from the massive amount of online threats. PerfectAntivirus checks for missing or outdated security software as well as potentially unsafe system settings and monitors the behavior of system processes to detect new and unknown viruses. Because of these robust features, PerfectAntivirus takes the #3 spot in our top ten antivirus ratings.

Advanced Features:
Perfect Antivirus advanced features:•         
Free PerfectDisk Home Premium included!•         
Protects against viruses and spyware.•         
Stops phishing attempts at identity theft.•         
Screens and filters Facebook and Twitter links.•         
Warns you of malicious websites.•         
Won't interrupt full-speed PC performance.•         
Operates hassle-free with Autopilot.•         
Free technical phone and email support.

#4 Kaspersky Antivirus
Kaspersky Antivirus 2012 is well known for fast performance and amazing security capabilities. The software is said to be one among the fastest antivirus software that does not slow down the computer at all. Also, it provides maximum protection against virus and other forms of threat, online and/or offline. Fully compatible with Windows 7, Kaspersky provides security software for home computers, business computers and enterprises. Also, Kaspersky provides antivirus software for desktops, notebooks, mac computers and mobile devices. Kaspersky provides the best antivirus software for business computers and our chosen best enterprise antivirus software. If you are looking for best antivirus software for business computers or for enterprises, Kaspersky is the software for you. Based on our analysis, Kaspersky ranks at #4 in our top ten antivirus list.

Advanced Features:
Kaspersky Antivirus offers the following key technologies:•        
 Real-time scanning of internet activity, emails, instant messaging and any other activity.•        
 Improved identity theft protection system that protects you from spyware that can track your activities.•         Constantly scanning web pages you visit and disabling links that lead to malicious websites.•         
Self-protection from malware and protection hijacking of your computer.•         
Next generation proactive protection from zero-day attacks and unknown threats•        
 Free email, phone and chat support from Kaspersky's skilled tech team.

#5 Norton Antivirus
Norton by Symantec, is a pioneer in the computer security industry since years. Norton Antivirus 2012 is an improved version of the award winning antivirus software. Norton is constantly working to add features to their antivirus software to help you protect your computer from harmful viruses and malicious codes. The 2012 version is an improved version of their leading antivirus software. Norton Antivirus is the best antivirus for your desktop, notebook and mobile devices. It is fully tested to work with different operating systems and also compatible with the latest Windows 7 operating system. This is the reason it is the #5 antivirus in our top ten antivirus analysis.

Advanced Features:
One year subscription of Norton Antivirus includes:•         
Antivirus and antispyware protection for your computer.•         Protection against dangerous bots while surfing the web.•         
Top features like anti-rootkit, Norton pulse updates and more.•         
New Norton download insight to keep you safe from downloading infected files.•         
New Norton file insight gives you information about origination files on your computer.•         
New Norton threat insight tells you all about how successfully Norton controlled threats present on your computer.•        
 New Norton system insight tells you all about whats happening on your computer.•         
Norton Antivirus is a power packed software to keep your computer completely safe against old and new threats•         
Free email and phone support. Free online antivirus guides and information about latest threats.

#6 ESET Nod32 Antivirus 5
ESET Nod32 Antivirus is popular and well known for fast performance. ESET offers the most efficient antivirus software that does not slow down your computer. ESET has won many awards for providing a security solution which is not only fast but also robust. The leading technology used in their security software makes their antivirus one of the most promising antivirus software for Windows and MAC, desktops, notebooks and mobile devices. ESET provides the world's fastest and most effective proactive antivirus and antispyware protection for your home computer and hence it is our chosen #6 in our list of top ten antivirus software. ESET has received certifications from ICSA Labs, Virus Bulletin, AV-Comparatives, West Coast Labs, OPSWAT and more.

Advanced Features:The latest version ESET Nod32 Antivirus 5 offers:•         
ESET offers the world's fastest and most effective proactive antivirus and antispyware protection for your computer.•         
Fast, light and unobtrusive software protects your Internet experience without annoying system slowdowns.•         ESET's smart scanner scans SSL-encrypted communication channels like HTTPS and POP3S and finds hidden threats.•         
It scans in real-time the internet activity, email and instant messaging communication, mobile device communication and provides robust removable media security.•        
 ESET SysInspector and ESET SysRescue simplify diagnosing and cleaning of infected systems by allowing deep scans of system processes.•         
The most efficient antivirus, fast updates, fast scanning and best antivirus for gamers and gaming computers•         Free online antivirus guides. Free email, chat and phone support.

#7 F-Secure Antivirus
F-Secure is a well known entity in the PC security world and mobile security world. With years of experience in the security industry, F-secure offers a unique hi-tech antivirus software to protect your computer against the most harmful viruses and spyware. Like ESET and Vipre, their antivirus software is fast and does not slow down your PC while actively scanning. Their powerful DeepGuard cloud computing technology ensures the fastest protection against new threats. Also, the F-Secure antivirus 2012 can be configured in your native language easily. As per our review, this is why it is at #7 in our top ten antivirus ratings.

Advanced Features:
F-Secure Antivirus features:•         
Protects your computer against viruses, worms and other malware.•         
Detects and removes spyware, trojans, malware and malicious codes from your computer.•         
DeepGuard cloud computing technology ensures that none of the new or unknown threats can harm your computer.•         
Easy to install and very easy to configure. You can even configure it in your own language.•         
Real-time scanning and monitoring of usage activity and blocking of viruses, spyware and other malware in real-time.

#8 TrendMicro Titanium Antivirus
TrendMicro is a well known name in the computer security industry and offers leading antivirus software solution for home and home office users, small business computers, medium business computers and enterprises. For home and home office users, TrendMicro offers one complete security package that includes award-winning antivirus software, antispyware, protection from phishing websites, firewall and more. What makes TrendMicro software special is that apart from the advanced internet security, it also includes PC performance optimizer and data protection by offering 2GB online storage space. TrendMicro offers different packages for home users: TrendMicro Titanium Antivirus and TrendMicro Titanium Internet Security, these are the recent 2012 versions of their security. TrendMicro takes the #8 spot in our top ten antivirus ratings.

Advanced Features:
TrendMicro Titanium Antivirus features:•         
Prevent unauthorized changes to your applications, helps reducing virus infections.•         
Stops malicious downloads from internet and mobile devices attached to your computer system.•        
 Blocks your access to harmful, infected and phishing websites that may harm your computer.•         
Protect your children from accessing objectionable websites and limit internet usage time.•         
Protect your personal information from identity theft with encryption, shop safely over the internet without risking your sensitive information.•         
Complete protection from malicious links and downloads on instant messenger.•        
 Free 2GB online storage to store your critical data on TrendMicro's secure online website.•         
Specialized technical support staff ready to support through email, chat and phone.

#9 Zonealarm Antivirus
ZoneAlarm is operated by the popular CheckPoint Software Technologies Ltd.Checkpoint is a well known entity in the business and data security world. They have constantly developed solutions for businesses and enterprises. The same technology is used in their antivirus software for home and small business users, which means, you get a business class antivirus software for your home computer. ZoneAlarm Antivirus 2012 scans, detects and removes viruses, spyware, trojans, worms, bots and other malicious codes that may be harmful to your computer. The 2012 version is an improved version which is much faster and more secure than it's previous versions. The antivirus software is equipped with Firewall, OS Antispyware and anti-phishing engine. It is a one complete security solution for your PC. Based on our review, ZoneAlarm is at #9 in our top ten antivirus reviews.

Advanced Features:
Zonealarm Antivirus features:•         Advanced download protection to minimize the chances of virus infection through downloads from the internet or attached media.•         
Unified scan engine that offers superior detection and removes harmful viruses, spyware, trojans and more.•         Two-way Firewall to monitor all the incoming and outgoing activity on your computer system.•         
OSFirewall to monitor changes within the system files on your computer, minimizing changes due to infection.•         Anti-phishing and site status engine to block harmful and fraudulent websites that steal information.•         Advanced auto-learn system that configures the antivirus software to work according to your behavior.

#10 McAfee Antivirus Plus
McAfee is one among the oldest and most experienced company in the computer security industry. McAfee offers an award winning antivirus software, power packed with advanced features and technology that's nothing less than a pioneer in the antivirus world. McAfee's Antivirus 2012 is an improved version and much faster as compared to it's predecessors. With thousands of new viruses created every day, relying on traditional security updates isn't enough anymore. That's where the McAfee Active Protection technology plays a vital role. Although McAfee antivirus is a little slow as compared to other antivirus software, but still it is a robust security software for desktops and notebooks and hence takes the #10 place in our top ten antivirus list.

Advanced Features:
The McAfee Antivirus offers:•         McAfee Active Protection technology analyzes and blocks new and emerging threats in milliseconds.•         
Completely re-engineered fast antivirus software that does not slow down your computer system.•         Remarkable growth in performance, the new 2012 version is 8 times faster than its older versions.•         
Easier installation, configuration and better screens to give you all the information in just a glance.•         Refined alerts and shorter scans to protect your PC without any delay from harmful viruses and malicious codes on the internet.•         
Better protection against phishing, infected and dangerous websites that may harm your computer.


Virus protection is can be considered the most important aspect of computer ownership. No matter what you use your computer for, or how much it cost, it is vital to use some sort of virus protection to protect your valuable information from damage and theft. A lot of hackers, virus writers and suspicious malware creators were organizing out there – increasingly good at fooling computer users and can have the bragging rights to break in your so-called secure systems. That means that it is more important than ever to establish strong virus protection before ever hooking your new computer up to the internet.

Also, no matter what type of virus protection you use, however, it is vital to keep it updated. Most virus protection software allows users to schedule the antivirus signature updates to download and install automatically. This is important, since it is easy to forget to update the software, and an out of date virus protection software package is virtually worthless.

There are certainly many reasons to keep your virus software up to date, and to keep your computer protected. With so much personal and confidential information kept on the average personal computer, it is absolutely vital for every computer user to keep their private information out of the wrong hands, and strong virus protection is a cornerstone of that process.

Friday, February 24, 2012

Security risks in Social networking sites

Friday, February 24, 2012 1
Social networking sites are part of everyone’s life today but they can also be considered as another world for some people. It is a world where the things that cannot be done in ordinary life turns into reality.  It provides almost the wants and needs of people.

Conversely, the lack of physical contact in accessing social networking sites, users can mislay their privacy and can lead to casualties.

The lists of news below are proofs of what danger social networking sites can give if protection will not be considered.

By following these simple guidelines created by the Focus Editor, social networks patrons can keep to enjoy the power of internet and be able to manage safety and security. 

Be Discreet - Never type anything into a profile page, bulletin board, instant message or other type of online electronic form that would expose you to unwanted visitors or the possibility of identity theft or malicious threats. This includes personal and business names and addresses, phone numbers, job titles, birth dates, schedule details, daily routines and business or family information. It's far better to communicate in generalities than to reveal information that unscrupulous individuals may someday use against you.

Be Skeptical - Social network sites are full of useful business information, as well as to substantial amounts of useless disinformation. Treat anything you see online -- stock tips, advance news, personnel gossip and so on -- with a high degree of skepticism. Some people will lie in order to boost their own agenda, while others will spout unsubstantiated rubbish out of stupidity or sheer ignorance.

Be Thoughtful - Nobody likes a loudmouth, but the Internet has a curious way of releasing personal inhibitions. Never type anything online that can come back to bite you. This includes outrageous claims, slander, obscenity and insults. Be cool and professional, and always think twice before typing.

Be Professional - If you're posting a picture or video to a social network site, make sure it presents you in the best possible light. Dress professionally and, above all, don't disrobe or wear a funny hat.

Be Wary - People on the Internet are not always who they seem to be. The CEO you're chatting with in Denver may actually be a 14-year-old kid in Milwaukee -- or a prisoner in Romania. Until you can independently verify someone's identity -- using the same business tools that you would turn to to screen a new hire or confirm a prospective business partner -- never, ever reveal personal, business or financial information.

Check Privacy Policies - All major social network services have specific privacy guidelines that are published on their Web sites. Take the time to read and understand these documents, since they include the types of information that they will reveal -- or sell -- to other parties (including spammers). If you don't like the terms, don't use the service.

Social networking sites are potentially useful for everyone as it can be a source of income too, provided that users must approach them with an adequate amount of responsibility, caution and common sense.

Thursday, February 23, 2012

Cyber Crime Bill

Thursday, February 23, 2012 0
In every aspects of human life, there is what we called threat. It has always been the tail of what we produced or created. Which at first we think will be awesome but at the end of the day, the world threat will warp on. And this is not only in the territory of traditional but it’s been inside the vicinity of “technology”.
            In the world we are approaching today is the world where every thing is exposed and the space of privacy is getting thinner and thinner. Yes, people were getting used to it but still they were on the side to polish the messy thing about technology. This actually twisted their lives, from normal to extraordinary.
Life is easy with technology
Life is convenient with technology
Life is full of innovations with technology
But. . .
Life has been damage due to its wrong and malicious Exploitation. . .

The creation of Cyber Crime Bill was undeniably a strong element to withdraw ones dignity.  This would not only a thing like ornament but a weapon to strengthen the armor towards proper used of technology. Also this certainly takes part to innovate technology to the highest point without anyone being harm.

House Bill 6794,
Cybercrime Prevention Act of 2009

SEC. 4. Cybercrime Offenses: The following acts constitute the offenses of cybercrime punishable under this Act:

A. Offenses against the confidentiality, integrity and availability of computer data and systems:
1. Illegal Access. – the intentional access to the whole or any part of a computer system without right.
2. Illegal Interception. – the intentional interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data: Provided, That it shall not be unlawful for an officer, employee, or agent of a service provider, whose facilities are used in the transmission of communications, to intercept, disclose, or use that communication in the normal course of his employment while engaged in any activity that is necessary to the rendition of his service or to the protection of the rights or property of the service provider, except that the latter shall not utilize service observing or random monitoring except for mechanical or service control quality checks:
3. Data Interference – the intentional or reckless alteration of computer data without right;
4. System Interference – the intentional or reckless hindering without right of the functioning of a computer system by inputting, transmitting, deleting or altering computer data or program;
5. Misuse of Devices
(a) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
(i) a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
(ii) a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with the intent that it be used for the purpose of committing any of the offenses under this Act;
(b) The possession of an item referred to in paragraphs A,5(a) (i) or (ii) herein with the intent to use said devices for the purpose of committing any of the offenses under this Section: Provided, That no criminal liability shall attach when the use, production, sale, procurement, importation, distribution, or otherwise making available, or possession of computer devices/data referred to is for the authorized testing of a computer system.

B. Computer-related Offenses:
1. Computer Forgery
(a) The intentional input, alteration, or deletion of any computer data, without right resulting in unauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or
(b) The act of knowingly using a computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud – the intentional and unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, including but not limited to phishing, causing damage thereby, with the intent of procuring an economic benefit for oneself or for another person or for the perpetuation of a fraudulent or dishonest activity: Provided, That if no damage has yet been caused, the penalty imposable shall be one degree lower.
This particular section will basically criminalize hacking. It’s very vague though since it just says “computer data or program”. It’s pretty obvious that this will safeguard the rights of website owners from hackers but does this also extend to social networks, e-mails, and other online programs where your account can be hi-jacked by other malicious users? Other than that, does this affect the online gaming accounts of the youth where hacking is very much happening almost daily?
If all the above are included in the scope of the bill then the body that will handle cybercrime complaints should prepare themselves for a deluge of cases as soon as this is public. The lack of detail in the bill makes me think if the people who wrote this bill actually had social media experts and internet mavens as consultants? Because that would have definitely helped them out a lot.
Anyway, the bill also talks about how content can be considered an offense. See below.

C. Content-related Offenses:
1. Cybersex – engaging in any of the following acts:
(a) Establishing, maintaining or controlling, directly or indirectly, any operation for sexual activity or arousal with the aid of or through the use of a computer system, for a favor or consideration;
(b) Recording private acts, including but not limited to sexual acts, without the consent of all parties to the said acts or disseminating any such recording by any electronic means with or without the consent of all parties to the said acts;
(c) Coercing, intimidating, or fraudulently inducing another into doing such indecent acts for exhibition in the internet with the use of computer technologies;
(d) Exhibiting live or recorded shows depicting sexual or other obscene or indecent acts;
(e) Posting of pictures depicting sexual or other obscene or indecent acts;
(f) Establishing, financing, managing, producing, or promoting a cybersex operation;
(g) Participating, in whatever form, in the cybersex operation;
(h) Coercing, threatening, intimidating, or inducing anyone to participate in the cybersex operation;
2. Child Pornography – engaging in any of the following acts:
(a) Producing child pornography for the purpose of distribution through a computer system;
(b) Offering or making available child pornography through a computer system;
(c) Distribution or transmitting child pornography through a computer system;
(d) Procuring child pornography through a computer system for oneself or for another person; or
(e) Possessing child pornography materials in the computer system or on a computer data storage device or medium.
For the purposes of this Section, the term “child pornography” shall include pornographic material that visually depicts: (a) a minor engaged in sexually explicit conduct; (b) a person appearing to be a minor engaged in sexually explicit conduct, or (c) realistic images representing a minor engaged in sexually explicit conduct.
3. Unsolicited Commercial Communications. — the transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless:
(a) There is a prior affirmative consent from the recipient; or
(b) The following conditions are present:
(i) The commercial electronic communication contains a simple, valid, and reliable way for the recipient to reject receipt of further commercial electronic communication from the same source, also referred to as opt-out;
(ii) The commercial electronic communication does not purposely disguise the source of the electronic message; and
(iii) The commercial electronic communication does not purposely include misleading information in any part of the message in order to induce the recipients to read the message.
SEC. 5. Other Offenses. The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime – any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable; or
(b) Attempt to Commit Cybercrime – any person who willfully attempts to commit any of offenses enumerated in this Act shall be held liable.
SEC. 6. Liability under Other Laws. A prosecution under this Act shall be without prejudice to any liability for violation of any provision of Republic Act No. 3815, as amended, otherwise known as the Revised Penal Code, or any other law.

Wednesday, February 22, 2012

Line Of Work Available Online

Wednesday, February 22, 2012 0

           Truly, the wide ranging world of internet has now dominating almost all aspects of life, from the inconsequential things up to the major details. No one can deny the fact that nowadays, it takes the role of some other important matters that concerns human activities. It made things as easy and convenient as possible which results in saving human labor. 

            By the use of internet, things that are impossible, distant and remote before can now be feasibly accomplish in just a click away. Through this awesome yet bewildering created thing, people can reach the point beyond usual imagination and outside the range of human’s scrupulously created mind.  

            At an earlier time, it was discernible that both broadsheet and tabloid newspapers were the visible tool for the propagation of works and occupation. But through the use of internet, people can now search jobs and careers online in just one sitting. It is also one of the bewitching features of the internet that is capturing a lot of people from all walks of life. 

Also, it gave life to some various jobs which are now mushrooming in the country.

            Some of the careers needed online are Arts and Entertainment, Fashion and Textile, Insurance, Government and Food and Related Products jobs.

            Automotive,  Energy and Environment, Engineering, Construction and Maintenance jobs are also listed as the must have careers. 

Other jobs available online in other country are:

Accounting Jobs
Administration & Secretarial Jobs
Agriculture Jobs
  Animal Jobs
Aviation Jobs 
Banking & Financial Services Jobs 
Beauty Jobs 
Construction Jobs 
Customer Service Jobs 
Defense Jobs 
Education Jobs 
HR & Recruitment Jobs 
Legal Jobs 
Marketing Jobs 
Mining, Oil & Gas Jobs 
Real Estate Jobs 
Sales Jobs 
Security Jobs 
Trades & Services Jobs 
Transport Jobs  Volunteer Jobs 
            But also, bear in mind that just like other crucial things, one must be clever and should think more than once for every posted careers online. This medium can also be an instrument for illegal doings that were being practiced by a lot of awful people. So, before taking any other action, you must be really sure about it.
◄Design by ithemes builder | best woo themes | apptheme by Blogger Templates