Wednesday, July 13, 2011

Sunday, May 29, 2011

See yah..

'gotta go. .bye!!

I feel so empty . feeling q may kulang sa akin ngayon.
Hmm, amo kaya 'yon?

Tuesday, December 7, 2010

Hmm, wew!

Dito kami sa Mintal ngayon, (somewhere in Davao City). Two weeks na namin dito pero wala namang maganda dito except sa mga bibong bata na nagpi-perform sa gym nila. By the way, they are celebrating their fiesta (Immaculate Concepcion). Hmmp, Nakakabored dito, wala pa kami clients. Tapos, ang init-init pa kapag umaga .Kapag hapon naman umuulan.

Wala lang, share2x q lang. Gusto ko lang malaman ng iba na hindi naman madali ang trabaho sa mobile lalo na kapag hindi maganda ang panahon. Minsan naiinitan, minsan naman nababasa sa ulan . Kaya lang dapat naming paninidigan 'to. Parang part na kasi to sa mga responsibilities namin.

Anyways, masaya naman siya kaya lang minsan nakakapagod talaga.

But this our life .

Friday, April 23, 2010

hahaha happy!

i am very much happy and excited. .

hehehe, 'coz tomorrow will be my special day. .

hmm, wala naman talagang special except that it is my birthday but i just want to express my greatest gratitude that GOD give me another birthday. .
Thank you GOD. .

Saturday, October 3, 2009

hackers and cyber criminals

Cyber Criminals Or Friends
By Brenda Kay Winters

Criminals are using the internet more and more. The statistics tell us that one in four will become a victim of internet criminals. This article speaks of one type of internet criminal in particular. It is the one who wants to steal your identity.

Business and banking records have account numbers and social security numbers. These must be guarded. When you receive your bank statement in the mail, check it carefully. Change the PIN number often. This is the personal identification number your debit card requires. If you find an error, close out that account or change the pin number.

Hackers are persons who can obtain your passwords and private information from another computer. These computers are sometimes stolen or the old ones thrown in the trash. The hard drive is a disk that tells what ever information has been on that computer. Go to a reputable computer dealer to get your cleared or destroyed. Some criminals sell your personal information. Shared and wireless computers are most vulnerable to criminal attack. Home computers are safer.

Do not give out passwords to anyone. If some one asks you to call them, go to a public telephone and verify the number.They own scanners that copy your credit card information. Some will use it to take out a small amount of money to see how much you have in your account, then wipe it out later. These criminals are in chat rooms and social networking sites. Do not give out your drivers license number or social security number to them ever. Even the social security administration will not let you post your number on their site.

E-mail is electronic mail that comes to your computer mail. Get another e-mail account name for using the internet. Google, MSN and Yahoo offer e-mail accounts and your internet service provider gives you your main one. You may have to close out your account with your ISP if this e-mail is stolen. False web addresses and e-mails are all over the internet. They may tell you they are your place of employment and direct you to another site.

Do not open any e-mail if you are not sure who it is from. It may contain a virus that will ruin your computer, called crashing it, or slow it down. Hackers are criminals that can watch what you are doing on line. They follow your activity and hack into personal information. Firewalls protect you from hackers. Software purchased can block spam and viruses. Web addresses may be typed wrongly to look like a real site but they are not. Google, yahoo and MSN hotmail have excellent spam blocking filters. Use them.

They are not 100 per cent accurate though. So report spam which is an unwanted e-mail or one that asks for money to spam@uce.gov. Turn off your computer when not in use. It helps stop hackers and saves electricity. If you have become a victim of internet crime or suspect it, report it to http://www.ic3.gov

Brenda Kay Winters

Brenda Kay Winters - EzineArticles Expert Author

INTERNET

The Internet is a worldwide network of thousands of computers and computer networks. It is a public, voluntary, and cooperative effort between the connected institutions and is not owned or operated by any single organization. The Internet and Transmission Control Protocols were initially developed in 1973 by American computer scientist Vinton Cerf as part of a project sponsored by the United States Department of Defense Advanced Research Projects Agency (ARPA) and directed by American engineer Robert Kahn.

The Internet began as a computer network of ARPA (ARPAnet) that linked computer networks at several universities and research laboratories in the United States. The World Wide Web was developed in 1989 by English computer scientist Timothy Berners-Lee for the European Organization for Nuclear Research (CERN).

"The design of the Internet was done in 1973 and published in 1974. There ensued about 10 years of hard work, resulting in the roll out of Internet in 1983. Prior to that, a number of demonstrations were made of the technology - such as the first three-network interconnection demonstrated in November 1977 linking SATNET, PRNET and ARPANET in a path leading from Menlo Park, CA to University College London and back to USC/ISI in Marina del Rey, CA." . - Vinton Cerf explains the timing:

Internet, interconnection of computer networks that enables connected machines to communicate directly. The term popularly refers to a particular global interconnection of government, education, and business computer networks that is available to the public. There are also smaller internets, usually for the private use of a single organization, called intranets.

Internet technology is a primitive precursor of the Information Superhighway, a theoretical goal of computer communications to provide schools, libraries, businesses, and homes universal access to quality information that will educate, inform, and entertain. In early 1996, the Internet interconnected more than 25 million computers in over 180 countries and continues to grow at a dramatic rate.

How Internets Work
Internets are formed by connecting local networks through special computers in each network known as gateways. Gateway interconnections are made through various communication paths, including telephone lines, optical fibers, and radio links. Additional networks can be added by linking to new gateways. Information to be delivered to a remote machine is tagged with the computerized address of that particular machine.

Different types of addressing formats are used by the various services provided by internets (see Internet address). One format is known as dotted decimal, for example: 123.45.67.89. Another format describes the name of the destination computer and other routing information, such as "machine.dept.univ.edu." The suffix at the end of the internet address designates the type of organization that owns the particular computer network, for example, educational institutions (.edu), military locations (.mil), government offices (.gov), and non-profit organizations (.org). Networks outside the United States use suffixes that indicate the country, for example (.ca) for Canada.

Once addressed, the information leaves its home network through a gateway. It is routed from gateway to gateway until it reaches the local network containing the destination machine. Internets have no central control, that is, no single computer directs the flow of information. This differentiates internets from other types of online computer services, such as CompuServe, America Online, and the Microsoft Network.

The Internet Protocol
The Internet Protocol is the basic software used to control an internet. This protocol specifies how gateway machines route information from the sending computer to the recipient computer. Another protocol, Transmission Control Protocol, checks whether the information has arrived at the destination computer and, if not, causes the information to be resent.

Even though computer interaction is in its infancy, it has dramatically changed our world, bridging the barriers of time and distance, allowing people to share information and work together. Evolution toward the Information Superhighway will continue at an accelerating rate. Available content will grow rapidly, making it easier to find any information on the Internet. New applications will provide secure business transactions and new opportunities for commerce. New technologies will increase the speed of information transfer, allowing direct transfer of entertainment-on-demand. Broadcast television may be replaced by unicast, in which each home receives a signal especially tailored for what its residents want to see when they want to see it.