Wednesday, July 30, 2008
PLEASE READ: NAME THE DIFFERENCES
2. ? to 11 ?
Posted by: intel828c at 1:38 AM 0 comments
Tags: computer, computer technology, games, Hard drive, hardware
Tuesday, July 29, 2008
Most bloggers are Filipina
Ang kaspa - ka katol ba oi.
What is a keylogger?
A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.
Source: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci962518,00.html
Posted by: intel828c at 1:00 AM 0 comments
Tags: dll, exe, Hard drive, hardware, keylogger, rootkit, technology, trojan horse
Sunday, July 27, 2008
EW = SONA
Posted by: intel828c at 12:44 AM 0 comments
Saturday, July 26, 2008
Where and how to become a CISCO certified?
Coldplay
Eventually, Berryman joined the ranks, without consideration of what musical direction the band was taking. On 8 January 1998, the band's line-up was complete when Champion joined the band to take up percussion duties. The multi-talented Champion had grown up playing piano, guitar, bass, and tin whistle; he quickly learned the drums, despite having no previous experience with that instrument. At the time, the band performed under the name Starfish.
Eventually, they took the name Coldplay from a mutual friend, Tim, who had his own band. According to Martin, "He (Tim) decided he didn't like the name anymore because it was too depressing." In 1998, Coldplay was performing small club gigs for local Camden promoters.
Wanting more creative freedom, Martin recruited fellow student and childhood friend Phil Harvey to act as band manager. Harvey helped the band raise money needed to record a demo. Harvey managed the band up until and including the release of their debut album Parachutes.
Tuesday, July 22, 2008
Troubleshooting a PC
Posted by: intel828c at 6:55 PM 0 comments
Tags: acer, AOC, Hard drive, Intel, laptops, motherboard, PC, Screw driver
Sunday, July 20, 2008
What is U2's Best Song For You?
U2, Irish rock music band, which achieved worldwide popularity during the 1980s and 1990s. The group was formed in 1976 at a high school in Dublin, Ireland, by four students: vocalist Paul Hewson, known as Bono; guitarist David Evans, known as The Edge; bassist Adam Clayton; and drummer Larry Mullen, Jr. The band won a school talent contest in 1978, began playing in local clubs, and in 1980 released its debut album, Boy.Ducati fives 3.0
Posted by: intel828c at 4:30 PM 0 comments
Tags: ducati, eyewear, oakley, oakley ducati fives 3.0, plutonite, sunglasses, UV
Friday, July 18, 2008
Pinoy met Haponesa in Hong Kong
Posted by: intel828c at 5:28 PM 0 comments
Tags: disneyland, filipino, hongkong, japan, japanese, philippines, pinoy, tours, travel
Wednesday, July 16, 2008
Mr. Rott meets Ms. Lab
Rottweiler - breed of working dog, probably descended from a herding dog used by the Roman armies to drive their cattle and to guard their camps. Rottweilers are fairly large, strongly built, and intelligent, making excellent guard dogs. The short, coarse, flat hair is black, with tan to dark brown markings. The tail is short and carried horizontally. Males stand about 61 to 69 cm (about 24 to 27 in), females about 56 to 66 cm (about 22 to 26 in).check your PC for vulnerabilities
From remote - describes other vulnerabilities where the attack vector doesn't require access to the system or a local network. This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.Posted by: intel828c at 4:38 PM 0 comments
Tags: anti-virus, hackers, trojan horse, virus, vulnerabilities, worms
Tuesday, July 15, 2008
What is a 3G?
3G or third generation, is the generic term used for the next generation of mobile communications systems. The new systems will enhance the services available today and offer multimedia and internet access and the ability to view video footage.Posted by: intel828c at 9:27 PM 0 comments
Tags: 3G, Apple, Globe, Globe Telecom, iPhone 3G, iPOD, Microsoft, Microsoft Exchange
Come To Where The Flavor Is...
Sunday, July 13, 2008
His 27.6 kbps broadband connection is faster than the speed of whisper
Posted by: intel828c at 3:50 PM 0 comments
Tags: Broadband, dial-up, intel828c, ISDN, network connection, Philcom, PLDT mySDL
What is a Widgenie?
Posted by: intel828c at 3:35 PM 0 comments
Tags: application, blog, charting, power, software, widgenie, widget
Badyeton kung unsay pamaliton kay mahal na ang bugas karon
Posted by: intel828c at 3:33 PM 0 comments
Tags: abs-cbn, bisaya, bisaya espesyal, bugas, intel828c, nfa, rice
Disclosure Policy
The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question.
The owner(s) of this blog would like to disclose the following existing relationships. These are companies, organizations or individuals that may have a significant impact on the content of this blog. If you have questions please leave a message at my profile section.
To get your own policy, go to http://www.disclosurepolicy.org/
DOTa: Jakiro vs. Earthshaker
Posted by: intel828c at 3:28 PM 0 comments
Tags: dota, earthshaker, gaming, intel828c, jakiro, jakiro vs earthshaker, software, technology, warcraft III
Why Sheila baptized the name Duraday?
Posted by: intel828c at 3:19 PM 0 comments
Tags: duraday, intel828c, joke, panasonic, panasonic digicam, youtube
The Pic Won't Tell A Lie?
Posted by: intel828c at 2:12 PM 0 comments
Tags: bingka, dinuguan, photo, photography, travel, US tours without visa
How safe is your PC from these anti-viruses?
Posted by: intel828c at 2:01 PM 0 comments
Tags: anti-virus, avg, bitok, bulate, dumi, hugaw, intel828c, kagaw, kaspersky, mcafee, norton from symantec, software, technology, trojan horse, virus, worms
Jakiro - The Twin Head Dragon DOTa
Posted by: intel828c at 1:48 PM 0 comments
Tags: dota, games, intel828c, technology, Twin Head Dragon, warcraft III
what is a blog?
I dont know what a blog is, I thought blog is a sound from the water that you drink. what is a blog anyway? hehehe











