Global Pinoy News
Friday, September 12, 2008
risks in celebrity web search
Internet security firm McAfee Inc. said "Brad Pitt" or "Beyonce" key words are "the most dangerous celebrities" for web searchers.
Information and pictures that people search linking to key words "Pitt" and many others, including related downloads, wallpapers and screen savers, give users' PCs more than 15% chance of virus, spyware, spam, phishing and adware infections.
Searches for celebrity gossip, downloads, wallpaper and screen savers may direct surfers to fake web sites that endanger vulnerable computers or users.
McAfee also lists Mariah Carey, David Beckham, Rihanna, Fergie, Katie Holmes, Angelina Jolie, Katherine Heigl, Jessica Alba, Lindsay Lohan, Cameron Diaz and George Clooney as dangerous key words. Words Pitt and Justin Timberlake top the list for men. Beyonce and Heidi Montag for women.
Viruses, worms and spyware are known to serve marketing purposes or worse, steal sensitive information.
The revelation points to the need for added computer security, antivirus upgrades and users' education.
Monday, August 18, 2008
going dual-core and mobile
I have been searching the net and looking at displays in malls and retail outlets for 'affordable' mobile computers. Dual-Core presently gets my attention rather than the more expensive Core Duo. I am hoping prices would still go down in the coming months.
One of the models I like is Packard Bell’s FO445-U-078 EasyNote. Its processor is Intel Pentium Dual-Core T2080 (1.73GHz, 1Mb, 533MHz) and has a 1.0Gb DDR2 memory. Its monitor is 14.1in. LCD. The hard drive has 120Gb, while its optical drive is a Super Multi DVD Writer. It has a built-in modem, LAN and Wi-Fi. Weighing 2 kilos, it also has Bluetooth, a built-in webcam and card readers. A unit costs PhP 36,000 in malls but a catalog lists it at PhP27,799.00 as the lowest price.
The other model I found is a Toshiba L200. Its specs are Intel Pentium Dual-Core T2330 1.60GHz, 1Mb L2, 533MHz 2.0Gb DDR2. The hard disk holds 160Gb and also has a DVD RW optical drive. It is packed with a wireless LAN and 60-day trial of Windows Vista Home Basic OS. A unit costs PhP 38,999.
The third model that caught my interest is the Aspire 2920Z-2A2G16Mi which has an Intel Pentium Dual-Core Processor T2330 (1.60GHz, 533MHz FSB, 1Mb L2 cache). It boasts of having the most technical specs compared to the previous two models. Its Optical drive is a DVD-Super Multi Double-Layer drive and RW. It has an Audio Dolby-certified surround sound system, built-in stereo speakers and subwoofer supporting low-frequency effects Dolby Home Theater audio enhancement featuring Dolby Digital, Dolby Digital Live, and lots of other hi-tech features for video and sounds for maximum entertainment. The WiFi, webcam, modem and all features mentioned earlier for the two notebooks adds to its attractiveness.
It seems I will need this sort of gadget to boost my productivity, whether at home or mobile, or even during power outages expected during bad weather. I am really expecting prices to go lower and it would be the best for us if Core-Duo notebooks would become as affordable as well.
Saturday, August 2, 2008
computer games I played
In the 1980s, there was Nintendo Family Computer. The Supermario Brothers 1-3, Strider, Rockman / Mega Man, Contra Team, Gradius, Battle City, Wrecking Crew, Astroboy and 100-in-1 games were on top of my to-play list. I also had the opportunity to try out light-gun and joystick attachments in shooting games, Duckhunt and Pac Man, Atari Space Invaders or Galaxian remakes.
The coming of the 1990s brought with it the evolution of personal computers or desktops where more sophisticated tasks can be accomplished. The user can prepare word documents, spreadsheets, layouts, drawings, and play games with high resolution graphics and animation. Eventually, as the processors and silicon chips got better, as technology improved, many more advanced games were created and more story lines, game types and expansions made into virtual reality. The games not only reflected reality, they also expanded the fantasy realms, from the deepest parts of the earth, the past to future worlds, and alternative universes as far as imagination can take.
Among those I remember playing were CounterStrike, Command and Conquer, Red Alert, Diablo 2, Ragnarok, Exile, Warcraft, Starcraft, and Battle for Wesnoth.
Saturday, June 18, 2005
technology vs safety
In the age of e-cash, unlimited sms, wireless tapping, bluetooth, echelon, and blogging (wala lang, rhymes with tapping), how safe is safe, and how private is private? Are there enough measures to ensure our security? Of course, you already know that ATM accounts can be tampered, our text messages are logged, and cellphones also serve as tracking devices, among other possible security risks. Imagine the possibilities, and the risks. Years from now, would you want to have your own SIM implant, a number code or bar code, or a centralized national/international ID?
Disclosure Policy
This blog is a personal blog written and edited by me. This blog accepts forms of cash advertising, sponsorship, paid insertions or other forms of compensation.
This blog abides by word of mouth marketing standards. We believe in honesty of relationship, opinion and identity. The compensation received may influence the advertising content, topics or posts made in this blog. That content, advertising space or post will be clearly identified as paid or sponsored content.
The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question.
This blog does contain content which might present a conflict of interest. This content may not always be identified.
To get your own policy, go to http://www.disclosurepolicy.org