Ghenz.Joyce.Haru.

Banner 468

Facebook
RSS

Stay Safe on Net

     The Internet can be a wonderful resource for everyone. We can use it to research school reports, communicate with others, and play interactive games. Even kids who are old enough to punch in a few letters on the keyboard can literally access the world.
     But that access can also pose hazards. For example, an 8-year-old might do an online search for "Lego." But with just one missed keystroke, the word "Legs" is entered instead, and the child may be directed to a slew of websites with a focus on legs — some of which may contain pornographic material.
     That's why it's important to be aware of what your kids see and hear on the Internet, who they meet, and what they share about themselves online.

 Online Protection Tools

     Online tools are available that will let you control your access to adult material and help protect kids from Internet predators. No option is going to guarantee that they'll be kept away from 100% of the risks on the Internet. So it's important to be aware of your kids' computer activities and educate them about online risks.

     Many Internet service providers (ISPs) provide parent-control options to block certain material from coming into a computer. You can also get software that helps block access to certain sites based on a "bad site" list that your ISP creates. Filtering programs can block sites from coming in and restrict personal information from being sent online. Other programs can monitor and track online activity. Also, make sure your kids create a screen name to protect their real identity.
    Many sites use "cookies," devices that track specific information about the user, such as name, email address, and shopping preferences. Cookies can be disabled. Ask your Internet service provider for more information.

Chat Room Caution

     Chat rooms are virtual online rooms where chat sessions take place. They're set up according to interest or subject, such as a favorite sport or TV show. Because people can communicate with each other alone or in a group, chat rooms are among the most popular destinations on the Web — especially for kids and teens.
     But chat rooms can pose hazards for kids. Some kids have met "friends" in chat rooms who were interested in exploiting them. No one knows how common chat-room predators are, but pedophiles (adults who are sexually interested in children) are known to frequent chat rooms.
     These predators sometimes prod their online acquaintances to exchange personal information, such as addresses and phone numbers, thus putting the kids they are chatting with — and their families — at risk.
     Pedophiles often pose as teenagers in chat rooms. Because many kids have been told by parents not to give out their home phone numbers, pedophiles may encourage kids to call them; with caller ID the offenders instantly have the kids' phone numbers.

[ Read More ]

What is Cyber Crime Bill?

     Voting 13-1, legislators approved on third and final reading Senate Bill (SB) 2796, which penalizes cybercrimes such as hacking and spamming.



Who are Involve?
     SB 2796 calls for the creating of the Office of Cybercrime under the Department of Justice.

     A National Cybersecurity Coordinating Council will also be established under the Office of the President, to be aided by the National Cybersecurity Center that will be established under the Science and Technology department.

     The measure’s enactment into law is expected to take some time as a counterpart bill remains pending at the comittee level in the House of Representatives. 




It's Consequences
     Violators will be fined at least P200,000 or an amount commensurate to the damage caused. They can also be jailed for six years and a day up to 12 years.

     Cyber-squatters -- those creating
 online content “in bad faith to profit, mislead, destroy reputation and deprive others from registering the same” -- also face similar penalties.

     People who engage in cybersex “for favor or consideration”, meanwhile, face fines of up to P1 million along with jail terms, while child pornographers face penalties set under the Anti-Child Pornography law.

     Those
 advertising and selling products or services via the Internet without the recipient’s consent face fines of P50,000-250,000 along with a jail term of up to six months.
[ Read More ]

The Best Antivirus of 2012

     Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worms, Trojan horses, spyware and adware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods.
     A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.
     No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.


Effectiveness of Anti-Virus
     Studies in December 2007 showed that the effectiveness of antivirus software had decreased in the previous year, particularly against unknown or zero day attacks. The computer magazine c't found that detection rates for these threats had dropped from 40-50% in 2006 to 20-30% in 2007. At that time, the only exception was the NOD32 antivirus, which managed a detection rate of 68 percent.
     The problem is magnified by the changing intent of virus authors. Some years ago it was obvious when a virus infection was present. The viruses of the day, written by amateurs, exhibited destructive behavior or pop-ups. Modern viruses are often written by professionals, financed by criminal organizations.
      Independent testing on all the major virus scanners consistently shows that none provide 100% virus detection. The best ones provided as high as 99.6% detection, while the lowest provided only 81.8% in tests conducted in February 2010. All virus scanners produce false positive results as well, identifying benign files as malware.
     Although methodologies may differ, some notable independent quality testing agencies include AV-Comparatives, ICSA Labs, West Coast Labs, VB100 and other members of the Anti-Malware Testing Standards Organization.

What’s the Best Anti-Virus of 2012?
     Best Antivirus 2012 has been developed by our own world renowned antivirus software experts. We spend the majority of our days removing viruses from computers. Through our testing experts have learned which programs provide the best virus removal features and especially which ones provide the best virus protection.

Ensuring Customer Satisfaction 
     To ensure top quality customer satisfaction, Best Antivirus 2012, give the most up-to-date news and virus removal information on the latest virus threats circulating the web. We pay attention to Internet security news world-wide and make sure to pass along any helpful tips. With our many years of expertise, they have established several trustworthy sites that provide real-time virus news and virus removal tips.
 


Rated # 1

The PC Tools Spyware Doctor with Antivirus was the classiest performer, and at the top of our list of top drawer antivirus programs. The best part of testing this product was the ease of installation, and you won't  experience any problems getting the program running. This is not typical of many antivirus programs and really made this one stand out. The customer service experience was very positive, as well. 



  • ·         Easy-To-Use
  • ·         Voted #1 for 2012
  • ·         Free Customer Support
  • ·         Blocks Spyware & Viruses
  •                                    ·         3 Licenses for the Price of 1



Rated # 2
ESET NOD Antivirus 5 has an extensive track record of only putting their best foot forward and this year does not appear to be any different. For 2012 ESET NOD Antivirus 5 gives massive protection with zero slowdown and a ridiculously advanced diagnostic tool. They appear to have a big advantage for this year’s Best Antivirus 2012 crown. 

  • ·         Great Protection
  • ·         Simple Interface
  • ·         Automatic Updates



Rated # 3
Avira Antivir Premium 2012 Antivirus makes the list of best antivirus 2012. Avira has been a world leader for antivirus software over many years and nothing looks to change for 2012. When people asks who has the best antivirus software for 2012, Avira AntiVir Premium is always on our list. Once again, it’s all about the exclusive features that rank Avira near the top of the list of best antivirus programs for 2012. 



  • ·         Low Price
  • ·         Many Features
  • ·         Easy Installation


Rated # 4
It won't  take a lot of time to rank Panda Antivirus Pro 2012 as a Top Antivirus Program for 2012. It's quick to learn that the good people at Panda were hard at work making big upgrades to this already superb antivirus software. 2012 could be a huge year for Panda and their Panda Antivirus Pro 2012 program. Their super fast and easy-to-use antivirus program will impress even the harshest critics. Panda Antivirus Pro 2012comes standard with plenty of new features and its signature cloud based protection helps make it fast and super light on your PC. 

  • ·         Cloud Bases
  • ·         Fast and Reliable
  • ·         Extreme Protection


Rated # 5
Trend Micro Titanium Antivirus offers fierce cloud security antivirus protection in real-time. They have a great reputation and this year’s product is loaded with all the standard features we have come to expect from this powerful product. Trend Micro’s legendary reputation and quality product is not the only reason it qualified as one of the Best Antivirus for 2012 it has been in the Top Ten Antivirus 5 years in a row! 



  • ·         Cloud Based
  • ·         Easy Installation
  • ·         Extremely Effective


Rated # 6

AVG Anti-Virus 2012 comes with some huge new features and it’s all backed by the award winning technology to keep your computer protected. AVG Anti-Virus 2012 comes with it one of the most extensive solutions for virus protection. This year they have made several improvements and added some enhancements to their social networking protection. Although there were other products with slightly better protection this still ranked as one of the best antivirus for 2012. 

[ Read More ]

"CROPPING AND CHOPPING" -- New Trend In Magazine Covers

Acknowledging ones flaws and putting them out to show the world is not what today’s superstars are branded for. Since photoshop and photo editing were created, it became hard not only for the photo loving mass to distinguish what’s real and what’s not.

When every magazine ad or cover is showing the throng a full color glossy of a perfect, beautiful woman or man, you start to adore and admire their beauties and start to question yourself and ask if you measure up, only to realize later that these images are altered, touched up or digitally manipulated.

Whether it is heavy airbrushing, zapping zits, brightening those baby blues, contouring or more aggressively removing some unwanted back fat and pushing the eyes two inches apart so that the face appears more doll like- it happens. Some editors even go the other way and make the image worse than it originally was.

Magazines that run these doctored shots believe it gives them an air of exclusivity or originality, but sometimes they are shown as the fakes they are. We have some ads and covers that really push the pixels on a photo and others that do it with a more subtle approach.


JINKEE PACQUIAO AND CHARICE PEMPENGCO

 “Charice [Pempengco] for Preview or Jinkee Pacquiao for Mega? Sino mas maganda pagkakaedit?” asked one netizen who posted a side-by-side comparison of magazine covers featuring Charice and Jinkee on Twitter.

The two celebrities are featured on the covers of the January  issues of fashion magazines Preview and Mega, and reactions online vary from admiration to outright disbelief. The debate has been so hot that Jinkee Pacquiao and MEGA Magazine trended locally on Twitter, as has Charice Pempengco.

Both magazine admins said that the editing they made on the images were “not too major”, though the crowd outrightly  disagreed.


KC CONCEPCION

A supposedly unedited photo of Rogue Magazine’s Jan/Feb 2012 issue featuring KC Conception on the cover was leaked online, where certain aspects of the cover was allegedly “photoshopped”.

           On the original cover, Concepcion is shown wearing a white swimsuit sporting a shorter hair. On her arms is KC’s pet python Coco and on her hands, she is seen clutching a fake head bearing great resemblance to actor Piolo Pascual; whom she recently broke up with and even shared the details on national television. But on the final cover, the resemblance was removed and on its place is a generic looking head. 



HEIDI KLUM

         Nope, not even Heidi is as hot as she seems. Worse was that her ghostly white complexion and that unnaturally flat and physically impossible rib cage made her look like a candidate cast in those vampire movies.






TAYLOR SWIFT

              This is what Taylor would look like after three lip injections, two face lifts and a nose job – all done with a really poor Photoshop job.


Here are some other magazine covers evidently photoshopped.


















[ Read More ]

Malunggay – The Wonder Gulay

     Malunggay is a popular plant known for nutritional value as well as a herbal medicine. Malunggay is a plant that grows in the tropical climates such as the Philippines, India and Africa. Malunggay is widely used as vegetable ingredient in cooking, as herbal medicine for a number of illness and other practical uses. The Malunngay plant can grow to as high as 9 meters with erect white trunks. The compund leaf has about 3 to 9 leaflets. Malunggay has white fragrant flowers that pruduces long pods with 3-angled winged seeds.

     Malunggay may be propagated by planting its seeds about an inch in the ground or matured malunggay stem cuttings of about 3 feet in length may also be planted into the ground. Planted malunggay cuttings grows faster compared to planted seeds.

Malunggay is known as: "Sajina" in India, "Shojne" in   Bengal, "Munagakaya" in   Telugu, "Shenano" in   Rajasthani, "Shevaga" in   Marathi, "Nuggekai" in Kannada, "Drumstick Tree, Horse Radish Tree, Ben Oil Tree" in English, "La mu" in Chinese.


Its Nutrition as Herbal Medicine
     Malunggay has been used as herbal medicine in many cultures for hundreds of years; Malunggay is known as a very nutritious plant where it is used to combat malnultrition in third world countries especially for infants and nursing mothers.

     The malunggay pods are the most valued and widely used part of the plant. Malunggay pods contain essential amino acids, vitamins and other nutrients. Malunggay pods may be eaten raw or may be prepared or cooked. Malunggay pods may be fried and may produce clear, odorless and sweet oil mostly called - Ben Oil.

     Malunggay leaves may be eaten as greens, in salads and as vegetable ingredients for soups and other tropical viands. Malunggay flowers are cooked and eaten either mixed with other foods or fried in batter.

Its Medical Uses and Health Benefits
     Malunggay is used to combat malnutrition, especially among infants and nursing mothers vitamins A, B and C, calcium, iron and protein
     In late 1940's, The Department of Biochemistry at the Indian Institute of Science in Bangalore (PLN Rao) have found that malunggay or Moringa Oleifera leaves contain a compound "pterygospermin" that is known in medical science as having antimicrobial, antibacterial, anti-fungal properties.

     Malunggay or Moringa has been shown in studies to have an anti-tumor capacity. Moringa contains benzyl isothiocyanate. There are many studies that have shown this chemical and compounds derived thereof to have anti-cancer and chemo protective capabilities. This chemo protective aspect is critical for those who are battling cancer; this helps strengthen cells so that they can tolerate chemotherapy. Malunggay is also considered in the treatment of prostate cancer and skin cancer.

     Malunggay has been found to inhibit inflammation in a controlled scientific study conducted by Philippine DOST Scientists (Amelia P. Guevara, Carolyn Vargas and Milagros Uy). When an aqueous seed extract of malunggay has been administered to a carrageenan induced inflammation, it was noted that the aqueous seed extract of the Malunggay (Moringa Oleifera) inhibited the development of edema in ratpaw. The Malunggay is traditionally used to prevent and treat inflammations associated with rheumatism, arthritis and joint pains.

     Fuglie LJ (1999) The Miracle Tree: Moringa oleifera: Natural Nutrition for the Tropics has reported that Malunggay or Moringa Oleifera is widely believed to have an aphrodisiac action that enhances the sexual activity. Malunggay or moringa oleifera young leaves are also widely used to increase the flow of milk for lactating mothers.
How to Prepare
Malunggay as food.
     Malunggay pods may be eaten raw or may also be fried with peanut similar taste. Malunggay leaves and flower may also be cooked together with other vegetables and meat to form soups or viands.

Malunggay decoction for washing sores and wounds.
     Boil malunggay roots and let it cool to tolerable warm temperature and use it to wash wounds and sores. By gargling the Malunggay decoctionm, it may also be used to wash mouth sores and sore throats.

Malunggay poultice.
     Grounded Malunggay seeds, leaves and bark may be applied topically as poultice onto swollen flesh to relieve inflammation.

Malunggay oil.
     It may be taken internally as mixed with foods; it is known to be a powerful antioxidant even used by the early people from Egypt. Malunggay oil also known as Ben oil is widely used as oil base for perfumes and cosmetics. The oil is extracted from Malunggay seeds by pressing.

Its Side Effects
Although malunggay consumption is generally accepted as safe. But according to Indian traditional usage, Malunggay may have an abortificient effects.
[ Read More ]

Search Box