Friday, February 25, 2011

what the hell by avril lavigne

You say that I'm messing with
your head
All cause I was making out with
your friend
Love hurts whether it's right or
wrong I can't stop cause I'm having too
much fun You're on your knees
Begging please
Stay with me
But honestly
I just need to be a little crazy All my life I've been good,
But now
I'm thinking What The Hell
All I want is to mess around
And I don't really care about
If you love me If you hate me
You can save me
Baby, baby
All my life I've been good
But now
Whoaaa... What The Hell So what if I go out on a million
dates
You never call or listen to me
anyway
I'd rather rage than sit around
and wait all day Don't get me wrong
I just need some time to play You're on your knees
Begging please
Stay with me
But honestly
I just need to be a little crazy All my life I've been good,
But now
I'm thinking What The Hell
All I want is to mess around Avril Lavigne What The Hell
lyrics found on http://
www.directlyrics.com/avril-
lavigne-what-the-hell-
lyrics.html And I don't really care about
If you love me
If you hate me
You can save me
Baby, baby
All my life I've been good But now
Whoaaa...
What The Hell Lalalala la la
Whoa Whoa
Lalalala la la
Whoa Whoa You say that I'm messing with
your head
Boy, I like messing in your bed
Yeah, I am messing with your
head when
I'm messing with you in bed All my life I've been good,
But now
I'm thinking What The Hell
All I want is to mess around
And I don't really care about
All my life I've been good, But now
I'm thinking What The Hell
All I want is to mess around
And I don't really care about
If you love me
If you hate me You can save me
Baby, baby
All my life I've been good
But now
Whoaaa...
What The Hell Lalalalalalalalalala
Lalalalalalalalala Send "What The Hell"

fireworks
Do you ever feel like a plastic
bag
Drifting throught the wind
Wanting to start again Do you ever feel, feel so paper
thin
Like a house of cards
One blow from caving in Do you ever feel already buried
deep
Six feet under scream
But no one seems to hear a
thing Do you know that there's still a
chance for you
Cause there's a spark in you You just gotta ignite the light
And let it shine
Just own the night
Like the Fourth of July Cause baby you're a firework
Come on show 'em what you're
worth
Make 'em go "Oh, oh, oh!"
As you shoot across the sky-y-
y Baby you're a firework
Come on let your colors burst
Make 'em go "Oh, oh, oh!"
You're gunna leave 'em fallin'
down-own-own You don't have to feel like a
waste of space
You're original, cannot be
replaced
If you only knew what the
future holds After a hurricane comes a
rainbow Maybe you're reason why all
the doors are closed
So you could open one that
leads you to the perfect road Katy Perry Firework lyrics
found on http://
www.directlyrics.com/katy-
perry-firework-lyrics.html Like a lightning bolt, your heart
will blow
And when it's time, you'll know You just gotta ignite the light
And let it shine
Just own the night
Like the Fourth of July Cause baby you're a firework
Come on show 'em what you're
worth
Make 'em go "Oh, oh, oh!"
As you shoot across the sky-y-
y Baby you're a firework
Come on let your colors burst
Make 'em go "Oh, oh, oh!"
You're gonna leave 'em all in
awe-awe-awe" Boom, boom, boom
Even brighter than the moon,
moon, moon
It's always been inside of you,
you, you
And now it's time to let it through Cause baby you're a firework
Come on show 'em what your
worth
Make 'em go "Oh, oh, oh!"
As you shoot across the sky-y-
y Baby you're a firework
Come on slet your colors burst
Make 'em go "Oh, oh, oh!"
You're gonna leave 'em all in
awe-awe-awe Boom, boom, boom
Even brighter than the moon,
moon, moon
Boom, boom, boom
Even brighter than the moon,
moon, moon

Can't sleep tonight,
'Cause you're on my mind.
I guess I'm in love once again.
they say a star,
'Cause that's what you are.
You light up my life once again. I'll take this chance for another
romance in my Life,
'Cause you're all that I need. I can't help myself,
From falling in love,
With somebody like you,
'Cause your feelings are true.
Can't help myself,
From falling in love. For I can't help myself...
From falling for you. [ Lyrics from: http://
www.lyricsmode.com/lyrics/t/
toni_gonzaga/
cant_help_myself.html ] All day I pray,
That forever you'll stay,
And won't let our love fade
away.
Hear what I say,
Whatever come away? We'll be together come what
may. I'll take this chance for another
romance in my Life,
'Cause you're all that I need. I can't help myself,
From falling in love,
With somebody like you,
'Cause your feelings are true.
Can't help myself,
From falling in love. For I can't help myself...
From falling for you. I've never felt this love,
Until you came,
In my mind. And I can't help myself,
From falling in love,
With somebody like you,
'Cause your feelings are true.
Can't help myself,
From falling in love. For I can't help myself...
From falling for you

Thursday, February 10, 2011

(act. 2)

I CHOOSE TOPIC IS SOFTWARE QUALITY ASSURANCE..IN MY OWN IDEA ANG EXPLANATION IS THAT:

Quality Assurance makes sure the project will be completed based on the previously agreed specifications, standards and functionality required without defects and possible problems. It monitors and tries to improve the development process from the beginning of the project to ensure this. It is oriented to "prevention"Quality assurance and testing are two of the most critical components to maintaining a competitive edge. We believe that proactive QA is the key to cost savings, decreased risks, and successful software projects. With six world-class testing centers around the globe, Symbio offers a comprehensive range of independent testing and Quality Assurance (QA) consulting services that adhere to the highest levels of security, integration and industry standard processes. Using our dedicated testing labs, QA expertise and team flexibility, we are able to increase the quality of our clients' products while reducing time-to-market, management risks and operating costs.The process of ensuring that a software system and its associated documentation are in all respects of sufficient quality for their purpose. While a quality assurance team may be involved in all stages of a development project, there is typically a recognized quality assurance activity following completion of development and prior to release of the system for operational use. 

The checks performed by the quality assurance team (which should be independent of the development team) vary between organizations and also depend on the nature and purpose of the software system. However they typically include functional testing of the software, checks that programming standards have been respected, that the program documentation is complete and of an adequate standard, and that the user documentation for the system is of the desired quality. The team would also probably explore the reliability of the software system, and attempt to ensure that the software system and its associated documentation are so organized as to promote system maintainability.



FILIPINO INVENTORS IN CONNECTION IN I.T

1. Karaoke: Invented in 1975 by Roberto del Rosario. I really thought this was a Japanese invention, despite its’ popularity here, and I was completely wrong. A brilliant guy, he invented many other musical devices, but Karaoke will always be remembered as his greatest triumph (or bane to humankind, depending on your point of view.)
2. Medical Incubator: Invented in 1941 by Fe del Mundo. She was the first Asian student in Harvard’s School of medicine. Countless young lives were saved by her invention and genius.
3. Moon Buggy: Invented in 1968 by Eduardo San Juan. He was the project leader for NASA in the buggy development: An underfunded and underappreciated engineering success. This one has special significance to me, due to my Grandfather working at the Cape in the early space program. The moon buggy allowed greater exploration of the Moon, yet Eduardo San Juan’s contribution has been relegated largely to status as a footnote.
4. Erythromycin: Invented (Discovered) by Dr. Abelardo Aguilar in 1949. He sent a sample to Eli Lilly, who promptly stole the idea and patented it, and later marketed it successfully. Remember kids, this is why the great inventors always go to attorneys first… He never received a single peso from his product, that saved millions of lives (Thank him if you are allergic to penicillin!).

ICT-INFORMATION COMMUNNICATIION TECHNOLOGY
Information and communications technology or information and communication technology,[1] usually called ICT, is often used as an extended synonym for information technology (IT) but is usually a more general term that stresses the role of unified communicationsand the integration of telecommunications (telephone lines and wireless signals), intelligent building management systems and audio-visual systems in modern information technology. ICT consists of all technical means used to handle information and aid communication, including computer and network hardware, communication middlewareas well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions.[2] The expression was first used in 1997[3] in a report by Dennis Stevenson to the UK government[4] and promoted by the new National Curriculum documents for the UK in 2000.
ICT is often used in the context of "ICT roadmap" to indicate the path that an organization will take with their ICT needs.[5][6]
The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. See VOIP and Intelligent Infrastructure Management (IIM). This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems.

COMPUTER 20 YEARS FROM NOW...
Slower, less powerful, lower capacity, more expensive, better manufactured, fewer of them.

Read more: 

Friday, January 28, 2011

(act. 1)5 innovation gadgets in 2011

samsung Series 8 LED TV
We predict that this year will be the year of Smart TVs. Last year 3D TV and tablets grabbed the headlines, but this year television vendors are taking things that one step further, which is of no surprise as they have been promising such for a while now. At the top of the list is Samsung’s latest Series 8 LED offering. So what is so special about it? Well, it has a 200Hz referesh rate, and a 2 millisecond motion picture response time (ie, very crisp, very clear, superb pictures). Without getting too technical, it offers very deep blacks and pure whites, which again, lends itself to brilliant pictures. Where the smart technology comes in is its Bluetooth connectivity, built-in wifi, 3D capability, and a touch control TV remote that also can stream a television programme on the remote’s built-in 3-inch LCD. In other words; desperate to make that cup of coffee, but don’t want to miss anything on the tellie? Take the remote with you and watch the programme. Although this technology was hinted at last year, it is now heading for the mainstream.                                                                                                                  




Samsung Series 8 LED TV
We predict that this year will be the year of Smart TVs. Last year 3D TV and tablets grabbed the headlines, but this year television vendors are taking things that one step further, which is of no surprise as they have been promising such for a while now. At the top of the list is Samsung’s latest Series 8 LED offering. So what is so special about it? Well, it has a 200Hz referesh rate, and a 2 millisecond motion picture response time (ie, very crisp, very clear, superb pictures). Without getting too technical, it offers very deep blacks and pure whites, which again, lends itself to brilliant pictures. Where the smart technology comes in is its Bluetooth connectivity, built-in wifi, 3D capability, and a touch control TV remote that also can stream a television programme on the remote’s built-in 3-inch LCD. In other words; desperate to make that cup of coffee, but don’t want to miss anything on the tellie? Take the remote with you and watch the programme. Although this technology was hinted at last year, it is now heading for the mainstream.





Garmin GTU 10 Tracker
Garmin specialises in GPS devices, however this time they have introduced something that is a little bit different.  This is an excellent device to keep track of kids that parents feel are old enough to have a little bit of independence, but not old enough to run their own lives completely. Where its genius lies is in its GeoFences feature. These ‘fences’ are virtual boundaries that can be created on the unit that allows a parent to keep track of your kids by setting regions they can be in at certain times of the day. For example, one such boundary could include the route to school and the school itself. You will be sent a text or email telling you that they are outside the school grounds when the shouldn’t be. It can also be attached to your dog’s collar if your canine companion has  penchant for wandering off when they should be at home. Some might think it smacks of Big Brother, but then again, who doesn’t want their kids in a safe environment? It also comes with a Li-ion battery, which can last up to four weeks.





Sony 3D Goggles With Built-in OLED Screen
No, you don’t watch your 3D TV with these futuristic looking set of specs, you actually watch the screen displayed within the goggles. People were queuing for ages to get a gander at this latest bit of tech from the struggling CE giant. How good are they? Not bad considering they were at concept stage. The aforementioned OLED screen has 1280 x 720 resolution, and the colour reproduction was top notch. However, while they looked good, there was a slight hitch in the practicality department – you have to hold the glasses in place. We are hoping the R&D department at Sony are sorting out a solution when working models start coming off the production line.



Acer’s  Iconia Windows 7 Laptop
This gets the nod for a couple of reasons. First, it has a dual LCD multi-touch screens – one of which is located where the keyboard should be. However, never fear. If you do need the keyboard, a ‘virtual’ version can be made to appear where the traditional keyboard usually sits, so you can get the best of both worlds. Second, as well as being powered by an Intel Core i5 processor and having the Windows 7 operating system, we found the touchscreen aspects of the unit – especially the Acer ‘Ring’ that lets you move between the different onscreen protocols – very user friendly. Finally, it just looks cool. Others may argue there are a lot more practical and better featured laptops out there at the moment, but there’s something intriguing about a piece of technology that moves our perceptions of what a laptop should look like. And going by the crowds hankering around the device at CES, it fit that bill with ease.






Wednesday, December 15, 2010

Monday, December 13, 2010

IT104 1st ass.

#1. Why has been there a dramatic increase in the number of computer related security incidents in recent years?
ans.
 
 
 
 
#2. What are some characteristics of common computer criminals, including their objective?
        ans : Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks.[1] Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or identity theft) and electronic fraud.[2]
In the infancy of the hacker subculture and the computer underground,[3] criminal convictions were rare because there was an informal code of ethics that was followed by white hat hackers.[4] Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[5] White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around.[6] They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security.[6] As the computer industry matured, individuals with malicious intentions (black hats) would emerge to exploit computer systems for their own personal profit.[6]
Convictions of computer crimes, or hacking, began as early as 1983 with the case of The 414s from the 414 area code in Milwaukee. In that case, six teenagers broke into a number of high-profile computer systems, including Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. On May 1, 1983, one of the 414s, Gerald Wondra, was sentenced to two years of probation.[7] As of 2009, the longest prison term for computer crimes—nearly five years—was handed down to Jeanson James Ancheta, who created hundreds of zombie computers to do his bidding via giant bot networks or botnets.[8] He then sold the botnets to the highest bidder who in turn used them for Denial-of-service (DoS) attacks.

#3. What actions must be taken in response to a security incidents?
       ans : By having these " Reducing Vulnerabilities" ..

ass.2


FIREWALL
Long term readers of this blog will know that I am keen on personal security from the computer perspective and also that I am keen on windows users installing personal firewalls. My friends will tell you how often my eyes roll when they ask me to fix their unprotected machines.
First I guess, a definition of personal is required here.  By this I simply mean it is a software based firewall that sits on the same machine it is intending to protect. So I’m not talking standalone stuff like Smoothwall or Firestarter (both *nix based and free) and neither am I talking about the big boys of Corporate security such as Checkpoint, Cisco PIXes,  Cyberguards, well the list does go on.
I hear often and long about all you need is a router and an anti-virus application (maybe an anti-malware scanner) but you should never need more than Windows provides and certainly you shouldn’t need a firewall beyond stealthing your open internet ports. Well I disagree and I will continue to do so whilst Windows maintains its inherently buggy approach to security. Beyond this I hear the so called experts say that so long as we are careful never to install or click on anything untoward then we don’t need a personal firewall.
Bull.
So long as we all remain human, then we all remain susceptible to malware or buggy software. Take me for example – in >25 years in IT I have never so much as had a virus or any other form of malware attack my PC until recently and I am very careful about what I do and don’t do.
However, I can’t legislate for my children (or my wife) who will click on ill chosen adverts by web masters – and so recently I ended up with Vundo on my system. Whilst I can’t (well I can but won’t) control my children’s clicking behaviour to the nth degree, what I have drilled into them is  that if a popup appears they come and get me or stop what they are doing and wait for me or phone me [parenting 101 tip: I always have time for my children]. So whilst my system got this trojan I wasn’t susceptible to the spying activities of it because my personal firewall detected the outbound activity and threw up the alert. It then took me best part of a day on and off to remove the horrible thing, but at least it didn’t leak anything.