? ??????????????Murdah City? ????? ?? ???Rating: 4.4 (7 Ratings)??26 Grabs Today. 5630 Total Grabs. ??????
Preview?? | ??Get the Code?? ?? ?????????????????????????????????Old Fashion Love? ????? ?? ???Rating: 4.5 (15 Ratings)??24 Grabs Today. 6557 Total Grabs. ??????Preview?? | ??Get the BLOGGER TEMPLATES AND TWITTER BACKGROUNDS ?

Tuesday, February 2, 2010

Red Hat Linux 6.2 Installation Guidelines

Red Hat Linux 6.2 Installation Guidelines
The easiest method of installing Red Hat Linux 6.2 in a virtual machine is to use the standard Red Hat distribution CD. The notes below describe an installation using the standard distribution CD; however, installing Red Hat Linux 6.2 via the boot floppy/network method is supported as well. Before installing the operating system, be sure that you have already created a new virtual machine and configured it using the ESX Server Virtual Machine Wizard.

Caution: Red Hat Linux 6.2 does not run on Pentium 4 processors. It also does not run on Xeon processors that are branded Xeon, with no qualifier, or Xeon-MP (Pentium III Xeon processors are OK).

Install Red Hat Linux 6.2 using the text mode installer, which you may choose when you first boot the installer. At the Red Hat Linux 6.2 CD boot prompt, you are offered the following choices:

To install or upgrade a system ... in graphical mode ...

To install or upgrade a system ... in text mode, type: text .

To enable expert mode, ...

Use the function keys listed below ...


Choose the text mode installer by typing text followed by Enter.

Note: During the Red Hat Linux 6.2 installation, a standard VGA16 X server (without support for the VMware ESX Server X server) is installed. To get an accelerated SVGA X server running inside the virtual machine, you should install the VMware Tools package immediately after installing Red Hat Linux 6.2.


Red Hat Linux 6.2 Installation Steps
1.Use the VMware Management Interface to verify the virtual machine's devices are set up as you expect before starting the installation. For example, if you would like networking software to be installed during the Red Hat Linux 6.2 installation process, be sure the virtual machine's Ethernet adapter is enabled and configured.
If you plan to install the guest operating system from a physical CD-ROM disc, be sure the CD-ROM drive is connected to the virtual machine.

2.Insert the Red Hat Linux 6.2 CD in the CD-ROM drive and click the Power On button. The virtual machine should start booting from the CD and the installation process begins.
3.Follow the installation steps as you would for a real PC.
Note: If the virtual machine's Ethernet adapter has been enabled, the installation program automatically detects and loads the AMD PC/Net 32 driver (no command line parameter is necessary to load the driver).

4.During the Linux installation, select the standard VGA16 X server. Select the Generic VGA compatible/Generic VGA card from the list in the Choose a Card screen. Select the Generic Monitor entry from the list in the Monitor Setup screen. Select the Probe button from the Screen Configuration dialog and select OK from the Starting X dialog.
After you finish installing Linux, Be sure to install VMware Tools in your guest operating system. For details, see Installing VMware Tools and the Network Driver in the Guest Operating System. When you install VMware Tools, the generic X server is replaced with the accelerated X server included in the VMware Tools package.

5.Finish installing Red Hat Linux 6.2 as you would on a physical machine.
At this point Red Hat 6.2 boots and presents a login screen.

Windows XP Installation Guidelines

Windows XP Installation Guidelines

You can install Windows XP Home Edition or Professional in a virtual machine using the corresponding Windows XP distribution CD.

Note: To use SCSI disks in a Windows XP virtual machine, you need a special SCSI driver available from the download section of the VMware Web site at www.vmware.com/download. Follow the instructions on the Web site to use the driver with a fresh installation of Windows XP. If you have a virtual machine with a SCSI virtual disk and a Windows 9x, Windows Me, Windows NT or Windows 2000 guest operating system and want to upgrade it to Windows XP, install the new SCSI driver before upgrading the operating system.


Installation Steps
If you want to run Windows XP Home Edition or Professional in a VMware Workstation virtual machine, be sure you have a full installation CD for the operating system.

Before installing the operating system, be sure that you have already created a new virtual machine and configured it using the VMware Workstation New Virtual Machine Wizard (on Windows hosts) or Configuration Wizard (on Linux hosts). Make sure you selected Windows XP as your guest operating system.

Now, you're ready to install Windows XP Home Edition or Professional.


Installing the Guest Operating System
1.Use the VMware Workstation Configuration Editor to verify the virtual machine's devices are set up as you expect before starting the installation. For example, if you would like networking software to be installed during the Windows XP installation, be sure the virtual machine's Ethernet adapter is configured and enabled. VMware also recommends that you disable the screen saver on the host system before starting the installation process.

2.Insert the installation CD in the CD-ROM drive.

3.Power on the virtual machine to start installing the guest operating system.

4.Follow the installation steps as you would for a physical machine, except as noted in the following steps.

5.After the system reboots, a message balloon asks if you want Windows to automatically correct your screen resolution and color depth setting. Do not make the change at this time. You cannot change resolution and color depth until you have installed the VMware SVGA driver - part of the VMware Tools package.

6.Run the VMware Tools installer. For details, see Installing VMware Tools.

7.When the guest operating system reboots, allow it to change the screen resolution and color depth setting.

Sunday, September 13, 2009






















Hackers, a group that consists of skilled computer enthusiasts. A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent. The term white hat is used for a person who is ethically opposed to the abuse of computer systems, but is frequently no less skilled. The term cracker was coined by Richard Stallman to provide an alternative to using the existing word hacker for this meaning.The somewhat similar activity of defeating copy prevention devices in software which may or may not be legal in a country's laws is actually software cracking.

There are numbers of Hackers in the world till date, Few has become famous by their Black hat work and few of them are famous by their Ethical Hacking. Below is separate list of World's All Time Best Hackers and Crackers. Although I represent them by Hackers only because what every they did, was wrong but one thing is sure they were Brilliant. Hacking is not a work of simple mind, only Intelligent Mind can do that.


Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including Army, Air Force, Navy and NASA systems The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage.





The youth, known as "cOmrade" on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department's most sensitive operations and stealing data from 13 NASA computers, including some devoted to the new International Space Station. James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost.




Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker


The Department of Justice describes him as “the most wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation’s computer network and stealing software.Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.





Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, (taing over all of the station’s phone lines) which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.


Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.




Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market.According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).






David Smith, the author of the e-mail virus known as Melissa, which swamped computers around the world, spreading like a malicious chain letter. He was facing nearly 40 years in jail . About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, but Smith is the only person to go to federal prison in the United States for sending one.



Republic Act No. 8792 of Philippines
Electronic Commerce Act of 2000
by the Senate and House of Representatives of the Republic of the Philippines
An act providing for the recognition and use of electronic commercial and non-commercial
transactions and documents, penalties for unlawful use thereof and for other purposes
Be it enacted by the senate and house of representatives of the republic of the Philippines in
congress assembled:



PART I
SHORT TITLE AND DECLARATION OF POLICY
Sec. 1. Short Title. - This Act shall be known as the "Electronic Commerce Act of 2000".
Sec. 2. Declaration of Policy. - The State recognizes the vital role of information and
communications technology (ICT) in nation-building; the need to create an information-friendly
environment which supports and ensures the availability, diversity and affordability of ICT
products and services; the primary responsibility of the private sector in contributing investments
and services in telecommunications and information technology; the need to develop, with
appropriate training programs and institutional policy changes, human resources for the
information technology age, a labor force skilled in the use of ICT and a population capable of
operating and utilizing electronic appliances and computers; its obligation to facilitate the transfer
and promotion of adaptation technology, to ensure network security, connectivity and neutrality of
technology for the national benefit; and the need to marshal, organize and deploy national
information infrastructures, comprising in both telecommunications network and strategic
information services, including their interconnection to the global information networks, with the
necessary and appropriate legal, financial, diplomatic and technical framework, systems and
facilities.chanrobles law firm



PART II
ELECTRONIC COMMERCE IN GENERAL
Sec. 3. Objective. - This Act aims to facilitate domestic and international dealings,
transactions, arrangements, agreements, contracts and exchanges and storage of information
through the utilization of electronic, optical and similar medium, mode, instrumentality and
technology to recognize the authenticity and reliability of electronic documents related to such
activities and to promote the universal use of electronic transaction in the government and general
public.
Sec. 4. Sphere of Application. - This Act shall apply to any kind of data message and
electronic document used in the context of commercial and non-commercial activities to include
domestic and international dealings, transactions, arrangements, agreements, contracts and
exchanges and storage of information. chanrobles law firm
Sec. 5. Definition of Terms. - For the purposes of this Act, the following terms are defined,
as follows:
a. “Addressee” refers to a person who is intended by the originator to receive the electronic
data message or electronic document. The term does not include a person acting as an
intermediary with respect to that electronic data message or electronic document.
b. “Computer” refers to any device or apparatus which, by electronic,electro-mechanical or
magnetic impulse, or by other means, is capable of receiving, recording, transmitting, storing,
processing, retrieving, or producing information, data, figures, symbols or other modes of written
expression according to mathematical and logical rules or of performing any one or more of those
functions.
c. “Electronic Data Message” refers to information generated, sent, received or stored by
electronic, optical or similar means.
d. “Information and Communication System” refers to a system intended for and capable of
generating, sending, receiving, storing or otherwise processing electronic data messages or
electronic documents and includes the computer system or other similar device by or in which data
is recorded or stored and any procedures related to the recording or storage of electronic data
message or electronic document. chanrobles law firm
e. “Electronic Signature” refers to any distinctive mark, characteristic and/or sound in
electronic form, representing the identity of a person and attached to or logically associated with
the electronic data message or electronic document or any methodology or procedures employed
or adopted by a person and executed or adopted by such person with the intention of
authenticating or approving an electronic data message or electronic document.
f. “Electronic Document” refers to information or the representation of information, data,
figures, symbols or other modes of written expression, described or however represented, by
which a right is established or an obligation extinguished, or by which a fact may be proved and
affirmed, which is received, recorded, transmitted, stored, processed, retrieved or produced
electronically.
g. “Electronic Key” refers to a secret code which secures and defendssensitive information
that crosses over public channels into a form decipherable only with a matching electronic key.
h. “Intermediary” refers to a person who in behalf of another person and with respect to a
particular electronic document sends, receives and/or stores or provides other services in respect
of that electronic document.
i. “Originator” refers to a person by whom, or on whose behalf, the electronic document
purports to have been created, generated and/or sent . The term does not include a person acting as
an intermediary with respect to that electronic document.
j. “Service Provider” refers to a provider of -
(i) On-line services or network access, or the operator of facilities therefor, including
entities offering the transmission, routing, or providing of connections for online communications,
digital or otherwise, between or among points specified by a user, of electronic documents of the
user’s choosing; or
(ii) The necessary technical means by which electronic documents of an originator may be
stored and made accessible to a designated or undesignated third party; chanrobles law firm
Such service providers shall have no authority to modify or alter the content of the electronic
data message or electronic document received or to make any entry therein on behalf of the
originator, addressee or any third party unless specifically authorized to do so, and who shall
retain the electronic document in accordance with the specific request or as necessary for the
purpose of performing the services it was engaged to perform.



CHAPTER II
LEGAL RECOGNITION OF ELECTRONIC WRITING
OR DOCUMENT AND DATA MESSAGES
Sec. 6. Legal Recognition of Data Messages. - Information shall not be denied legal effect,
validity or enforceability solely on the grounds that it is in the data message purporting to give rise
to such legal effect, or that it is merely referred to in that electronic data message.
Sec. 7. Legal Recognition of Electronic Documents. – Electronic documents shall have the
legal effect, validity or enforceability as any other document or legal writing, and -
(a) Where the law requires a document to be in writing, that requirement is met by an
electronic document if the said electronic document maintains its integrity and reliability and can
be authenticated so as to be usable for subsequent reference, in that -
(i) The electronic document has remained complete and unaltered, apart from the addition of
any endorsement and any authorized change, or any change which arises in the normal course of
communication, storage and display; and
(ii) The electronic document is reliable in the light of the purpose for which it was generated
and in the light of all the relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the form of an obligation or
whether the law simply provides consequences for the document not being presented or retained
in its original form. chanrobles law firm
(c) Where the law requires that a document be presented or retained in its original form, that
requirement is met by an electronic document if -
(i) There exists a reliable assurance as to the integrity of the document from the time when it
was first generated in its final form; and
(ii) That document is capable of being displayed to the person to whom it is to be presented:
Provided, That no provision of this Act shall apply to vary any and all requirements of existing
laws on formalities required in the execution of documents for their validity.
For evidentiary purposes, an electronic document shall be the functional equivalent of a
written document under existing laws.
This Act does not modify any statutory rule relating to the admissibility of electronic data
messages or electronic documents, except the rules relating to authentication and best evidence.
Sec. 8. Legal Recognition of Electronic Signatures. - An electronic signature on the
electronic document shall be equivalent to the signature of a person on a written document if that
signature is proved by showing that a prescribed procedure, not alterable by the parties interested
in the electronic document, existed under which -
(a) A method is used to identify the party sought to be bound and to indicate said party’s
access to the electronic document necessary for his consent or approval through the electronic
signature;
(b) Said method is reliable and appropriate for the purpose for which the electronic document
was generated or communicated, in the light of all the circumstances, including any relevant
agreement;
(c) It is necessary for the party sought to be bound, in order to proceed further with the
transaction, to have executed or provided the electronic signature; and
(d) The other party is authorized and enabled to verify the electronic signature and to make
the decision to proceed with the transaction authenticated by the same.
Sec. 9. Presumption Relating to Electronic Signatures. - In any proceedings involving an
electronic signature, it shall be presumed that -
(a) The electronic signature is the signature of the person to whom it correlates; and
(b) The electronic signature was affixed by that person with the intention of signing or
approving the electronic document unless the person relying on the electronically signed
electronic document knows or has notice of defects in or unreliability of the signature or reliance
on the electronic signature is not reasonable under the circumstances. chanrobles law firm
SEC. 10. Original Documents. - (1) Where the law requires information to be presented or
retained in its original form, that requirement is met by an electronic data message or electronic
document if:
(a) the integrity of the information from the time when it was first generated in its final form,
as an electronic data message or electronic document is shown by evidence aliunde or otherwise;
and
(b) where it is required that information be presented, that the information is capable of being
displayed to the person to whom it is to be presented.
(2) Paragraph (1) applies whether the requirement therein is in the form of an obligation or
whether the law simply provides consequences for the information not being presented or retained
in its original form.
(3) For the purposes of subparagraph (a) of paragraph (1):
(a) the criteria for assessing integrity shall be whether the information has remained complete
and unaltered, apart from the addition of any endorsement and any change which arises in the
normal course of communication, storage and display; and
(b) the standard of reliability required shall be assessed in the light of the purpose for which
the information was generated and in the light of all relevant circumstances. chanrobles law firm
SEC. 11. Authentication of Electronic Data Messages and Electronic Documents. - Until the
Supreme Court by appropriate rules shall have so provided, electronic documents, electronic data
messages and electronic signatures, shall be authenticated by demonstrating, substantiating and
validating a claimed identity of a user, device, or another entity in an information or
communication system, among other ways, as follows:
(a) The electronic signature shall be authenticated by proof that a letter, character, number or
other symbol in electronic form representing the persons named in and attached to or logically
associated with an electronic data message, electronic document, or that the appropriate
methodology or security procedures, when applicable, were employed or adopted by a person and
executed or adopted by such person, with the intention of authenticating or approving an
electronic data message or electronic document;
(b) The electronic data message and electronic document shall be authenticated by proof that
an appropriate security procedure, when applicable was adopted and employed for the purpose of
verifying the originator of an electronic data message and/or electronic document, orndetecting
error or alteration in the communication, content or storage of an electronic document or
electronic data message from a specific point, which, using algorithm or codes, identifying words
or numbers, encryptions, answers back or acknowledgment procedures, or similar security
devices.
The Supreme Court may adopt such other authentication procedures, including the use of
electronic notarization systems as necessary and advisable, as well as the certificate of
authentication on printed or hard copies of the electronic document or electronic data messages by
electronic notaries, service providers and other duly recognized or appointed certification
authorities.
The person seeking to introduce an electronic data message and electronic document in any
legal proceeding has the burden of proving itsauthenticity by evidence capable of supporting a
finding that the electronic data message and electronic document is what the person claims it to
be.
In the absence of evidence to the contrary, the integrity of the information and
communication system in which an electronic data message or electronic document is recorded or
stored may be established in any legal proceeding -
(a) By evidence that at all material times the information and communication system or other
similar device was operating in a manner that did not affect the integrity of the electronic data
message and/or electronic document, and there are no other reasonable grounds to doubt the
integrity of the information and communication system;
(b) By showing that the electronic data message and/or electronic document was recorded or
stored by a party to the proceedings who is adverse in interest to the party using it; or
(c) By showing that the electronic data message and/or electronic document was recorded or
stored in the usual and ordinary course of business by a person who is not a party to the
proceedings and who did not act under the control of the party using the record.
SEC. 12. Admissibility and Evidential Weight of Electronic Data Message and Electronic
Documents. - In any legal proceedings, nothing in the application of the rules on evidence shall
deny the admissibility of an electronic data message or electronic document in evidence -
a. On the sole ground that it is in electronic form; or
b. On the ground that it is not in the standard written form and electronic data message or
electronic document meeting, and complying with the requirements under Sections 6 or 7 hereof
shall be the best evidence of the agreement and transaction contained therein.
In assessing the evidential weight of an electronic data message or electronic document, the
reliability of the manner in which it was generated, stored or communicated, the reliability of the
manner in which its originator was identified, and other relevant factors shall be given due regard.
SEC. 13. Retention of Electronic Data Message and Electronic Document. - Notwithstanding
any provision of law, rule or regulation to the contrary -
(a) The requirement in any provision of law that certain documents be retained in their
original form is satisfied by retaining them in the form of an electronic data message or electronic
document which -
i. Remains accessible so as to be usable for subsequent reference;chanrobles law firm
ii. Is retained in the format in which it was generated, sent or received, or in a format which
can be demonstrated to accurately represent the electronic data message or electronic document
generated, sent or received;
iii. Enables the identification of its originator and addressee, as well as the determination of
the date and the time it was sent or received.
(b) The requirement referred to in paragraph (a) is satisfied by using the services of a third
party, provided that the conditions set forth in subparagraphs (i), (ii) and (iii) of paragraph (a) are
met.
SEC. 14. Proof By Affidavit. - The matters referred to in Section 12, on admissibility and
Section 9, on the presumption of integrity, may be presumed to have been established by an
affidavit given to the best of thedeponent's knowledge subject to the rights of parties in interest as
defined in the following section.
SEC. 15. Cross-Examination. - (1) A deponent of an affidavit referred to in Section 14 that
has been introduced in evidence may be cross-examined as of right by a party to the proceedings
who is adverse in interest to the party who has introduced the affidavit or has caused theaffidavit
to be introduced.
(2) Any party to the proceedings has the right to cross-examine a person referred to in
Section 11, paragraph 4, sub-paragraph c.



CHAPTER III
COMMUNICATION OF ELECTRONIC DATA
MESSAGES AND ELECTRONIC DOCUMENTS
SEC. 16. Formation and Validity of Electronic Contracts. - (1) Except as otherwise agreed by
the parties, an offer, the acceptance of an offer and such other elements required under existing
laws for the formation of contracts may be expressed in, demonstrated and proved by means of
electronic data message or electronic documents and no contract shall be denied validity or
enforceability on the sole ground that it is in the form of an electronic data message or electronic
document, or that any or all of the elements required under existing laws for the formation of the
contracts is expressed, demonstrated and proved by means of electronic documents.
(2) Electronic transactions made through networking among banks, or linkages thereof with
other entities or networks, and vice versa, shall be deemed consummated upon the actual
dispensing of cash or the debit of one account and the corresponding credit to another, whether
such transaction is initiated by the depositor or by an authorized collecting party: Provided, that
the obligation of one bank, entity, or person similarly situated to another arising therefrom shall be
considered absoluteand shall not be subjected to the process of preference of credits.
SEC. 17. Recognition by Parties of Electronic Data Message or Electronic Document. - As
between the originator and the addressee of a electronic data message or electronic document, a
declaration of will or other statement shall not be denied legal effect, validity or enforceability
solely on the ground that it is in the form of a electronic data message.
SEC. 18. Attribution of Electronic Data Message. - (1) An electronic data message or
electronic document is that of the originator ifit was sent by the originator himself.
(2) As between the originator and the addressee, an electronic data message or electronic
document is deemed to be that of the originator if itwas sent:
(a) by a person who had the authority to act on behalf of the originator with respect to that
electronic data message or electronic document; or
(b) by an information system programmed by, or on behalf of the originator to operate
automatically.
(3) As between the originator and the addressee, an addressee is entitled to regard an
electronic data message or electronic document as being that of the originator, and to act on that
assumption, if:
(a) in order to ascertain whether the electronic data message or electronic document was that
of the originator, the addressee properlyapplied a procedure previously agreed to by the originator
for that purpose; or
(b) the electronic data message or electronic document as received by the addressee resulted
from the actions of a person whose relationship with the originator or with any agent of the
originator enabled that person to gain access to a method used by the originator to identify
electronic data messages as his own.
(4) Paragraph (3) does not apply:
(a) as of the time when the addressee has both received notice from the originator that the
electronic data message or electronic document is not that of the originator, and has reasonable
time to act accordingly; or
(b) in a case within paragraph (3) sub-paragraph (b), at any time whenthe addressee knew or
should have known, had it exercised reasonable care or used any agreed procedure, that the
electronic data message or electronic document was not that of the originator.
(5) Where an electronic data message or electronic document is that of the originator or is
deemed to be that of the originator, or the addressee is entitled to act on that assumption, then, as
between the originator and the addressee, the addressee is entitled to regard the electronic data
message or electronic document as received as being what the originator intended to send, and to
act on that assumption. The addressee is not so entitled when it knew or should have known, had it
exercised reasonable care or used any agreed procedure, that the transmission resulted in any error
in the electronic data message or electronic document as received.
(6) The addressee is entitled to regard each electronic data message or electronic document
received as a separate electronic data message or electronic document and to act on that
assumption, except to the extent that it duplicates another electronic data message or electronic
documentand the addressee knew or should have known, had it exercised reasonable care or used
any agreed procedure, that the electronic data message or electronic document was a duplicate.
SEC. 19. Error on Electronic Data Message or Electronic Document. - The addressee is
entitled to regard the electronic data message or electronic document received as that which the
originator
intended to send, and to act on that assumption, unless the addressee knew or should have
known, had the addressee exercised reasonable care or used the appropriate procedure -
(a) That the transmission resulted in any error therein or in the electronicdocument when the
electronic data message or electronic document enters the designated information system, or
(b) That electronic data message or electronic document is sent to an information system
which is not so designated by the addressee for thepurpose.
SEC. 20. Agreement on Acknowledgment of Receipt of Electronic Data Messages or
Electronic Documents. - The following rules shall apply where, on or before sending an electronic
data message or electronic document, the originator and the addressee have agreed, or in that
electronic document or electronic data message, the originator has requested, that receipt of the
electronic document or electronic data message be acknowledged:
a) Where the originator has not agreed with the addressee that the acknowledgment be given
in a particular form or by a particular method,an acknowledgment may be given by or through any
communication by the addressee, automated or otherwise, or any conduct of the
addressee,sufficient to indicate to the originator that the electronic data message orelectronic
document has been received.
(b) Where the originator has stated that the effect or significance of theelectronic data
message or electronic document is conditional on receiptof the acknowledgment thereof, the
electronic data message or electronic document is treated as though it has never been sent, until
the acknowledgment is received.
(c) Where the originator has not stated that the effect or significance ofthe electronic data
message or electronic document is conditional onreceipt of the acknowledgment, and the
acknowledgment has not been received by the originator within the time specified or agreed or,
if notime has been specified or agreed, within a reasonable time, the originator may give notice to
the addressee stating that no acknowledgment hasbeen received and specifying a reasonable time
by which the acknowledgment must be received; and if the acknowledgment is not received within
the time specified in subparagraph (c), the originator may,upon notice to the addressee, treat the
electronic document or electronicdata message as though it had never been sent, or exercise any
other rights it may have.
SEC. 21. Time of Dispatch of Electronic Data Messages or Electronic Documents. - Unless
otherwise agreed between the originator and the addressee, the dispatch of an electronic data
message or electronic document occurs when it enters an information system outside the control of
the originator or of the person who sent the electronic data message or electronic document on
behalf of the originator.
SEC. 22. Time of Receipt of Electronic Data Messages or Electronic Documents. - Unless
otherwise agreed between the originator and the addressee, the time of receipt of an electronic
data message or electronic document is as follows:
(a) If the addressee has designated an information system for the purpose of receiving
electronic data message or electronic document,receipt occurs at the time when the electronic data
message or electronicdocument enters the designated information system: Provided, however,that
if the originator and the addressee are both participants in the designated information system,
receipt occurs at the time when theelectronic data message or electronic document is retrieved by
the addressee.
(b) If the electronic data message or electronic document is sent to aninformation system of
the addressee that is not the designated information system, receipt occurs at the time when the
electronic data message orelectronic document is retrieved by the addressee;
(c) If the addressee has not designated an information system, receiptoccurs when the
electronic data message or electronic document entersan information system of the addressee.
These rules apply notwithstanding that the place where the information system is located may
be different from the place where the electronic data message or electronic document is deemed to
be received.
SEC. 23. Place of Dispatch and Receipt of Electronic Data Messages or Electronic
Documents. - Unless otherwise agreed between the originator and the addressee, an electronic
data message or electronic document is deemed to be dispatched at the place where the originator
has its place of business and received at the place where the addressee has its place of business.
This rule shall apply even if the originator or addressee had used a laptop or other portable device
to transmit or receive his electronic data message or electronic document. This rule shall also
apply to determine the tax situs of such transaction.
For the purpose hereof -
a. If the originator or the addressee has more than one place of business,the place of business
is that which has the closest relationship to the underlying transaction or, where there is no
underlying transaction, the principal place of business.
b. If the originator of the addressee does not have a place of business, reference is to be
made to its habitual residence; or
c. The “usual place of residence” in relation to a body corporate, means the place where
it is incorporated or otherwise legally constituted.
SEC. 24. Choice of Security Methods. - Subject to applicable laws and/or rules and
guidelines promulgated by the Department of Trade and Industry with other appropriate
government agencies, parties to any electronic transaction shall be free to determine the type and
level of
electronic data message and electronic document security needed, and to select and use or
implement appropriate technological methods that suit their needs.



PART III
ELECTRONIC COMMERCE IN SPECIFIC AREAS


CHAPTER I.
CARRIAGE OF GOODS


SEC. 25. Actions Related to Contracts of Carriage of Goods. - Without derogating from the
provisions of part two of this law, this chapter applies to any action in connection with, or in
pursuance of, a contract of carriage of goods, including but not limited to:
(a) (i) furnishing the marks, number, quantity or weight of goods;
(ii) stating or declaring the nature or value of goods;
(iii) issuing a receipt for goods;
(iv) confirming that goods have been loaded;
(b) (i) notifying a person of terms and conditions of the contract;
(ii) giving instructions to a carrier; chanrobles law firm
(c) (i) claiming delivery of goods;
(ii) authorizing release of goods;
(iii) giving notice of loss of, or damage to, goods;
(d) giving any other notice or statement in connection with the
performance of the contract;
(e) undertaking to deliver goods to a named person or a person
(f) granting, acquiring, renouncing, surrendering, transferring or
negotiating rights in goods;
(g) acquiring or transferring rights and obligations under the contract. chanrobles law firm
SEC. 26. Transport Documents. - (1) Where the law requires that any action referred to
contract of carriage of goods be carried out in writing or by using a paper document, that
requirement is met if the action is carried out by using one or more data messages or electronic
documents.
(2) Paragraph (1) applies whether the requirement therein is in the form of an obligation or
whether the law simply provides consequences for failing either to carry out the action in writing
or to use a paper document.
(3) If a right is to be granted to, or an obligation is to be acquired by, one person and no other
person, and if the law requires that, in order to effect this, the right or obligation must be conveyed
to that person by the transfer, or use of, a paper document, that requirement is met if the right or
obligation is conveyed by using one or more electronic data messages or electronic documents
unique;
(4) For the purposes of paragraph (3), the standard of reliability required shall be assessed in
the light of the purpose for which the right or obligation was conveyed and in the light of all the
circumstances, including any relevant agreement.
(5) Where one or more data messages are used to effect any action in subparagraphs (f) and
(g) of Section 25, no paper document used to effect any such action is valid unless the use of
electronic data message orelectronic document has been terminated and replaced by the use of
paper documents. A paper document issued in these circumstances shall contain a statement of
such termination. The replacement of electronic data messages or electronic documents by paper
documents shall not affect the rights or obligations of the parties involved. chanrobles law firm
(6) If a rule of law is compulsorily applicable to a contract of carriage of goods which is in,
or is evidenced by, a paper document, that rule shall not be inapplicable to such a contract of
carriage of goods which is evidenced by one or more electronic data messages or electronic
documents by reason of the fact that the contract is evidenced by such electronic data messages or
electronic documents instead of by a paper document.chanrobles law firm
PART IV
ELECTRONIC TRANSACTIONS IN GOVERNMENT
SEC. 27. Government Use of Electronic Data Messages, Electronic Documents and
Electronic Signatures. - Notwithstanding any law to the contrary, within two (2) years from
thedate of the effectivity of this Act, all departments, bureaus, offices and agencies of the
government, as well as all government-owned and-controlled corporations, that pursuant to law
require or accept the filing of documents, require that documents be created, or retained and/or
submitted, issue permits, licenses or certificates of registration or approval, or provide for the
method and manner of payment or settlement of fees and other obligations to the government,
shall -
(a) accept the creation, filing or retention of such documents in the formof electronic data
messages or electronic documents;
(b) issue permits, licenses, or approval in the form of electronic data messages or electronic
documents;
(c) require and/or accept payments, and issue receipts acknowledging such payments,
through systems using electronic data messages orelectronic documents; or
(d) transact the government business and/or perform governmental functions using electronic
data messages or electronic documents, and forthe purpose, are authorized to adopt and
promulgate, after appropriatepublic hearing and with due publication in newspapers of general
circulation, the appropriate rules, regulations, or guidelines, to, among others, specify -
(1) the manner and format in which such electronic data messages orelectronic documents
shall be filed, created, retained or issued; chanrobles law firm
(2) where and when such electronic data messages or electronic documents have to be signed,
the use of a electronic signature, the typeof electronic signature required;
(3) the format of an electronic data message or electronic document and the manner the
electronic signature shall be affixed to the electronic data message or electronic document;
(4) the control processes and procedures as appropriate to ensure adequate integrity,
security and confidentiality of electronic datamessages or electronic documents or records or
payments;
(5) other attributes required of electronic data messages or electronic documents or payments;
and
(6) the full or limited use of the documents and papers for compliance with the government
requirements: Provided, That this Act shall by itself mandate any department of the government,
organ of state or statutory corporation to accept or issue any document in the form of
electronicdata messages or electronic documents upon the adoption, promulgation and
publication of the appropriate rules, regulations, or guidelines.
SEC. 28. RPWEB To Promote the Use Of Electronic Documents and Electronic Data
Messages In Government and to the General Public. - Within two (2) years from the effectivity of
this Act, there shall be installed an electronic online network in accordance with Administrative
Order 332 and House of Representatives Resolution 890, otherwise known as RPWEB, to
implement Part IV of this Act to facilitate the open, speedy and efficient electronic online
transmission, conveyance and use of electronic data messages or electronic documents amongst all
government departments, agencies, bureaus, offices down to the division level and to the regional
and provincial offices as practicable as possible, government owned and controlled corporations,
local
government units, other public instrumentalities, universities, colleges andother schools, and
universal access to the general public.
The RPWEB network shall serve as initial platform of the government information
infrastructure (GII) to facilitate the electronic online transmission and conveyance of government
services to evolve and improve by better technologies or kinds of electronic online wide area
networks utilizing, but not limited to, fiber optic, satellite, wireless and other broadband
telecommunication mediums or modes. To facilitate the rapid development of the GII, the
Department of Transportation and Communications, National Telecommunications Commission
and the National Computer Center are hereby directed to aggressively promote and implement a
policy environment and regulatory or non-regulatory framework that shall lead to the substantial
reduction of costs of including, but not limited to, lease lines, land, satellite and dial-up
telephone access, cheap broadband and wireless accessibility by government departments,
agencies, bureaus, offices, government owned and controlled corporations, local government units,
other public instrumentalities and the general public, to include the establishment of agovernment
website portal and a domestic internet exchange system to facilitate strategic access to government
and amongst agencies thereof and the general public and for the speedier flow of locally generated
internet traffic within the Philippines.
The physical infrastructure of cable and wireless systems for cable TV and broadcast
excluding programming and content and the management thereof shall be considered as within the
activity of telecommunications for the purpose of electronic commerce and to maximize the
convergence of ICT in the installation of the GII.
SEC. 29. Authority of the Department of Trade and Industry and Participating Entities. - The
Department of Trade and Industry (DTI) shall direct and supervise the promotion and
development of electronic commerce in the country with relevant government agencies, without
prejudice to the provisions of Republic Act. 7653 (Charter of Bangko Sentral ng Pilipinas)
and Republic Act No. 337 (General Banking Act), as amended.
Among others, the DTI is empowered to promulgate rules and regulations, as well as provide
quality standards or issue certifications, as the case may be, and perform such other functions as
may be necessary for the implementation of this Act in the area of electronic commerce to
include, but shall not be limited to, the installation of an online public information and
quality and price monitoring system for goods and services aimed in protecting the interests of the
consuming public availingof the advantages of this Act.



PART V
FINAL PROVISIONS
SEC. 30. Extent of Liability of a Service Provider. – Except as otherwise provided in this
Section, no person or party shall be subject to any civil or criminal liability in respect of the
electronic data message or electronic document for which the person or party acting as a service
provider as defined in Section 5 merely provides access if such liability is founded on -
(a) The obligations and liabilities of the parties under the electronic data message or
electronic document;
(b) The making, publication, dissemination or distribution of such materialor any statement
made in such material, including possible infringement ofany right subsisting in or in relation to
such material: Provided, That:
i. The service provider does not have actual knowledge, or is not awareof the facts or
circumstances from which it is apparent, that the making,publication, dissemination or distribution
of such material is unlawful or infringes any rights subsisting in or in relation to such material;
ii. The service provider does not knowingly receive a financial benefitdirectly attributable to
the unlawful or infringing activity; and
iii. The service provider does not directly commit any infringement or other unlawful act and
does not induce or cause another person or partyto commit any infringement or other unlawful act
and/or does not benefit financially from the infringing activity or unlawful act of another person
orparty: Provided, further, That nothing in this Section shall affect -
a) Any obligation founded on contract;
b) The obligation of a service provider as such under a licensing or other regulatory regime
established under written law; or
c) Any obligation imposed under any written law;
d) The civil liability of any party to the extent that such liability forms thebasis for injunctive
relief issued by a court under any law requiring thatthe service provider take or refrain from
actions necessary to remove, block or deny access to any material, or to preserve evidence of
aviolation of law.
SEC. 31. Lawful Access. - Access to an electronic file, or an electronic signature of an
electronic data message or electronic document shall only be authorized and enforced in favor of
the individual or entity having a legal right to the possession or the use of the plaintext, electronic
signature or file and solely for the authorized purposes. The electronic key for identity or
integrity shall not be made available to any person or party without the consent of the individual or
entity in lawful possession ofthat electronic key.
SEC. 32. Obligation of Confidentiality. - Except for the purposes authorized under this Act,
any person who obtained access to any electronic key, electronic data message, or electronic
document, book, register, correspondence, information, or other material pursuant to any
powers conferred under this Act, shall not convey to or share the same with any other person.
SEC. 33. Penalties. - The following Acts shall be penalized by fine and/or imprisonment, as
follows:
(a) Hacking or cracking which refers to unauthorized access into or interference in a
computer system/server or information and communication system; or any access in order to
corrupt, alter, steal, or destroy using a computer or other similar information and communication
devices, without the knowledge and consent of the owner of the computer or information and
communications system, including theintroduction of computer viruses and the like, resulting in
the corruption,destruction, alteration, theft or loss of electronic data messages or electronic
document shall be punished by a minimum fine of one hundredthousand pesos (P100,000.00) and
a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6)
months tothree (3) years;
(b) Piracy or the unauthorized copying, reproduction, dissemination,distribution, importation,
use, removal, alteration, substitution, modification, storage, uploading, downloading,
communication, making available to the public, or broadcasting of protected material,
electronicsignature or copyrighted works including legally protected sound recordings or
phonograms or information material on protected works,through the use of telecommunication
networks, such as, but not limitedto, the internet, in a manner that infringes intellectual property
rights shallbe punished by a minimum fine of one hundred thousand pesos (P100,000.00) and a
maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months
to three (3) years;
(c) Violations of the Consumer Act or Republic Act No. 7394 and other relevant or pertinent
laws through transactions covered by or usingelectronic data messages or electronic documents,
shall be penalized withthe same penalties as provided in those laws;
(d) Other violations of the provisions of this Act, shall be penalized with a maximum penalty
of onemillion pesos (P1,000,000.00) or six (6) years imprisonment. chanrobles law firm
SEC. 34. Implementing Rules and Regulations. - The DTI, Department of Budget and
Management and the Bangko Sentral ng Pilipinas are hereby empowered to enforce the provisions
of this Act andissue implementing rules and regulations necessary, in coordination withthe
Department of Transportation and Communications, National Telecommunications Commission,
National Computer Center, National Information Technology Council, Commission on Audit,
other concernedagencies and the private sector, to implement this Act within sixty (60)days after
its approval.
Failure to issue rules and regulations shall not in any manner affect the executory nature of
the provisions of this Act.
SEC. 35. Oversight Committee. – There shall be a Congressional Oversight Committee
composed of the Committees on Trade and Industry/Commerce, Science and Technology, Finance
and
Appropriations of both the Senate and House of Representatives, which shall meet at least
every quarter of the first two years and every semester for the third year after the approval of this
Act to oversee its implementation. The DTI, DBM, Bangko Sentral ng Pilipinas, and other
government agencies as may be determined by the Congressional Committee shall provide a
quarterly performance report of their actions taken in the implementation of this Act for the first
three (3) years.
SEC. 36. Appropriations. - The amount necessary to carry out the provisions of Secs. 27 and
28 of this Act shall be charged against any available funds and/or savings under the General
Appropriations Act of 2000 in the first year of effectivity of this Act. Thereafter, the funds
needed for the continued implementation shall be included in the annual General
Appropriations Act.
SEC. 37. Statutory Interpretation. - Unless otherwise expressly provided for, the
interpretation of this Act shall give due regard to its international origin and the need to promote
uniformity in its applicationand the observance of good faith in international trade relations. The
generally accepted principles of international law and convention on electronic commerce shall
likewise be considered.
SEC. 38. Variation by Agreement. - As between parties involved in generating, sending,
receiving, storing or otherwise processing electronic data message or electronic document, any
provision of this Act may be varied by agreement between and among them.
SEC. 39. Reciprocity. - All benefits, privileges, advantages or statutory rules established
under this Act, including those involving practice of profession, shall be enjoyed only by parties
whose country of origin grants the same benefits and privileges or advantages to Filipino citizens.
Sec. 40. Separability Clause. - The provisions of this Act are hereby declared separable and
in the event of any such provision is declared unconstitutional, the other provisions, which are not
affected, shall remainin force and effect.
Sec. 41. Repealing Clause. - All other laws, decrees, rules and regulations or parts thereof
which are inconsistent with the provisions of this Act are hereby repealed, amended or modified
accordingly.
Sec. 42. Effectivity. - This Act shall take effect immediately after its publication in the
Official Gazette or in at least two (2) national newspapers of general circulation.
Approved:
(Sgd.) PRESIDENT JOSEPH E. ESTRADA
Source: www.chanrobles.com 02/10/2002

Tuesday, September 8, 2009


Worms
A worm is a self-reproducing program which can travel over networks using networking mechanisms, without requiring any software or hardware support (such as a hard drive, a host program, a file, etc.) to spread; a worm is therefore a network virus.


How worms of the 1980s worked?
The most famous worm story dates from 1988. A student (Robert T. Morris of Cornell University) had created a program which could spread over a network. He ran it, and within eight hours, it had already infected several thousand computers. Because of this, many computers crashed within just a few hours, as the "worm" (as we now know it) reproduced too quickly to be erased by the network. What's more, all of these worms clogged up bandwidth, which forced the NSA to shut down the connections for a day.


Here's how the Morris worm spread on the network:


The worm gained entry into a UNIX machine
It created a list of machines connected to it
It brute-forced all the passwords from a list of words
It passed itself off as a user from each of the other machines
It created a small program on the machine so it could reproduce
It hid itself on the infected machine
and so on
Current worms
Current worms spread mainly with email clients (especially the client Outlook) using attachments that contain instructions for gathering all email address found in the address book and sending copies of themselves to all of these recipients.


These worms are usually scripts (typically in VBScript) or executable files sent as an attachment, which trigger when the recipient clicks on the attachment.


How do worms spread?
It is simple to protect yourself from infection by a worm. The best method is to avoid blindly opening files which are sent to you as attachments.
If you do, any executable files, or files which the OS can interpret, may potentially infect your computer.


Files with the following extensions, in particular, may potentially be infected: exe, com, bat, pif, vbs, scr, doc, xls, msi, eml


In Windows, it is recommended to disable the feature "hide extensions", because this feature can trick the user into thinking a file has a different extension. So a file with the extension .jpg.vbs will look like a .jpg file.


Files with the following extensions are not interpreted by the OS, and therefore the risk of infection from them is minimal: txt, jpg, gif, bmp, avi, mpg, asf, dat, mp3, wav, mid, ram, rm
It is common to hear that GIF or JPG files may contain viruses. In reality, any kind of file may contain code carrying a virus, but the system must have first been modified by another virus in order to interpret the code found in the files.


For any files whose extension hints that the file may be infected (or for extensions that you don't recognise), be sure to install an antivirus program and systematically scan every attachment before opening it.


Here is a larger (but non-exhaustive) list of extensions for files which may be infected by a virus:
Extensions:


386, ACE, ACM, ACV, ARC, ARJ, ASD, ASP, AVB, AX, BAT, BIN, BOO, BTM, CAB, CLA, CLASS, CDR, CHM, CMD, CNV, COM, CPL, CPT, CSC, CSS, DLL, DOC, DOT DRV, DVB, DWG, EML, EXE, FON, GMS, GVB, HLP, HTA, HTM, HTML, HTA, HTT, INF, INI, JS, JSE, LNK, MDB, MHT, MHTM, MHTML, MPD, MPP, MPT, MSG, MSI, MSO, NWS, OBD, OBJ, OBT, OBZ, OCX, OFT, OV?, PCI, PIF, PL, PPT, PWZ, POT, PRC, QPW, RAR, SCR, SBF, SH, SHB, SHS, SHTML, SHW, SMM, SYS, TAR.GZ, TD0, TGZ, TT6, TLB, TSK, TSP, VBE, VBS, VBX, VOM, VS?, VWP, VXE, VXD, WBK, WBT, WIZ, WK?, WPC, WPD, WML, WSH, WSC, XML, XLS, XLT, ZIP

Computer Viruses and Characterestics

OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

AT&T VIRUS: Every three minutes it tells you what great service you are getting.

MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.

PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.

POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."

RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.

MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

TED TURNER VIRUS: Colorizes your monochrome monitor.

ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.

DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!

GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.

FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.

GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)

TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.

TEXAS VIRUS: Makes sure that it's bigger than any other file.

ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.

AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.

PBS VIRUS: Your programs stop every few minutes to ask for money.

ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.

OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.

NIKE VIRUS: Just does it.

SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.

JIMMY HOFFA VIRUS: Your programs can never be found again.

CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.

KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.

IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.

STAR TREK VIRUS: Invades your system in places where no virus has gone before.

HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.

GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.

CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.

LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".

CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.

ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back. >>

Congressional Virus v 1.0 : Computer locks up, screen splits verticallywith a message appearing on each half blaming the other side for theproblem.

Congressional Virus v 1.5 : Overdraws your disk space. Congressional Virus v 2.0 : Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.

Dan Quayle Virus v 1.0: Their is sumthing rong with yor compueter, ewe justcan't figyour out watt.

Dan Quayle Virus v 1.5 : Prevents your system from spawning any childprocesses without joining into a binary network.

Dan Quayle Virus v 2.0 : Forces your computer to play "PGA TOUR" from10:00am to 4:00pm six days a week.

Tipper Gore Virus : When you attempt to play any sound file, it pops up a warning window stating that some lyrics may be unsuitable for children.

Right To Life Virus : Won't allow you to delete a file, regardless ofhow old it is. If you attempt to erase a file, it requires you tofirst see a counselor about possible alternatives.

Right-To-Life Virus : Before allowing you to delete any file, it first asks you if you've considered the alternatives.

Ross Perot Virus v 1.0 : Activates every component in your system, justbefore the whole thing quits.

Ross Perot Virus v 1.5 : Runs for awhile, leaves the system, then re-appears, but with less effect
.
Ross Perot Virus v 2.0 : Same as Jerry Brown Virus, only nicer fonts areused and it appears to have a lot more money and reality put into itsdevelopment.

Mario Cuomo Virus : It would be a great Virus, but it refuses to run.

I.T Profession Ethics


THE INFORMATION TECHNOLOGY PROFESSIONAL & SOCIETY]


Who is the IT professional?
For the purpose of this discourse, the key areas are those that relate to the Attitude, Skill and Knowledge of the IT professional. Interestingly these are the same areas of change that training focuses on. Training seeks to close or fill any gaps that an individual has in these areas. However, it must be noted that simply going for training programs does not make one a true and complete professional.


Are you meeting Expectations?
To be a competent IT professional, you must know what the expectations of your colleagues, your industry, your clients and the general public are. Meeting these expectations is what qualifies you to call yourself a professional, and what gives you recognition as a professional.In today's world the role of the IT professional is crucial. IT has become an essential resource for most organizations. The evolving scenario is one of a growing complexity of computer systems and businesses dependence on them. Qualified and competent IT professionals are needed to ensure the effectiveness and efficiency of computers.


The Diverse Nature of IT
Professionals work in areas such as Programming, Engineering, Database Administration, Networking, Web development and E-Commerce.IT professionals create, operate, maintain and program computers. An IT professional must have the skills and knowledge required to carry out specialized tasks in a recognized field of IT. This is the minimum requirement. But IT skills demand far outstrips supply. Current IT skills shortage worldwide is enormous.


Knowledge, Training, Experience
Knowledge (intellectual and conceptual) can be acquired through formal education sources such as private training institutions, colleges, institutions of higher learning, as well as E-learning on the Internet. The focus is on the intellectual, i.e. understanding concepts, generating ideas. Skills however, can be acquired and improved from work experience and practical training. The most effective form of skill building is through practical exercises.


Training and certification assists in improving skills, increasing knowledge and gaining recognition. Certification exams identify the necessary skills for an individual to perform their job competently and most important, successfully. For example, A+ certifies the competency of service professionals in the computer industry. Anyone who wants an internationally recognized credential as a competent computer service professional can take the A+ examination.
Because Certification is becoming the vogue in the IT industry today, more and more potential and working IT professionals want to get certified. It makes sense. Certification gives an IT professional, a valued credential that is recognized in the IT industry. Not only that, it is a powerful tool for providing job and business opportunities and for meeting challenges on the field. Improved income and enhanced professional credibility are powerful motivators for becoming IT certified. Popular certification programs are Microsoft Certified System Engineer (MCSE), A+, Oracle DBA, Cisco Certified Network Associate (CCNA) and Sun Certified Programmer (Java 2).


Does having a popular certification make you a competent and recognized IT professional?

Is certification part of your career development plan? If it is, this must be based on a solid understanding of what certification entails and how certification fits into your personal work / career goals.But as noted earlier, certification is only one way of ensuring you have the required skills and knowledge for IT professionalism. Formal education and Work experience, i.e. practical and relevant work experience, are also essential for IT skill and knowledge achievement.


However, does having superior IT skills, knowledge and certification make you a true professional?

"Administrators and network engineers do not live by Windows 2000 alone. " I have personally come in contact with IT certified individuals who I cannot dare to call professionals. Or what would you call an individual who has no regard for ethics and is ever ready to sacrifice professionalism at the altar of money? As a professional what is your attitude to the public, your work, your colleagues, or your clients?
What is your attitude towards business ethics? In today's fast and slick business environment, how relevant is ethics when you can take the easy way out? Everybody wants to be "fast and smart". To a professional, money is important but it is not everything. Money should not be your master. To maintain this attitude can sometimes be difficult, with the attendant daily pressures. But that is no excuse. If you want to be a true professional that is the price you must pay. IT professionals need to ask themselves: "Am I in IT for quick, short profit or am I in IT for the long distance?" The choice is yours.


Is the CCNA certified individual who defrauds his employers an IT professional? What about those who use their skills and knowledge for anti-social and destructive activities? Are they professionals too? The most notorious are hackers and Virus developers. These are highly skilled individuals but what they use those skills for are not in the interest of society. The same goes for IT fraudsters. If you have all certifications in this world and you use your knowledge and skills to steal and destroy you are nothing but a thief. The right attitude also extends to how you treat your clients or employers. Are you dependable and trustworthy? There are many examples of so-called professionals who talk down to clients, and who cheat their clients or employers. Is it truly ethical, for example, for a professional to take longer than necessary to perform a job? To say that he/she is sick in order to take a day off for leisure? To fail to report rule violations by a co-worker?The public expects the IT professional to be socially responsible and disciplined and should be a role model for the youth.


Lifelong Learning
IT professionals must also address is the issue of currency. Professionals must find ways of staying current on IT and IT related issues. This requires continuous self-development on the part of the IT professional. Simply because you are certified, or you have many years of experience, does not mean you should go to sleep. The IT field is one of the fastest developing fields worldwide. You cannot afford to be outdated or allow your skills to stagnate. You cannot serve your clients or employers well if you only have outdated ideas and information. As an IT professional, you cannot be relevant to your society if you are not current.Luckily with the digital age, there are many information, and learning opportunities available for serious and career-minded IT professionals. The Internet can be used for education and continuous self-development. Other tools that can be utilized for staying up to date include: books, publications, training, software, etc. But the presence of all these tools is not enough; as a professional you must have the ability and desire to update yourself on a continuous basis. We must never stop learning. This is especially crucial in IT. There must be a readiness and hunger to learn. Yesterday's knowledge may not be able to handle today's opportunities and challenges.

Value, Principles
In conclusion, one can state that IT professionalism doesn't end with getting certified and earning a fat pay. It isn't simply about being a skilled expert. Just as professionalism is about skills and knowledge, it is also about responsibility and duty. It is about using your skills and knowledge in a responsible and humane manner. It is about using your privileged status to bring about positive change in society.