Saturday, December 8, 2007

Job Requirement for China

A former colleague of mine has some technical support requirement for China. The company is http://www.centrify.com/

Job Description: Technical Support for Linux/Unix System
Experience: at least 2 years experience in handling Linux/Unix environment.
Free housing with meal allowance.
Salary: TBA

If you know somebody please send CV to mikehk@gmail.com

Thank you

Thursday, December 6, 2007

Look, Listen, Play - Dell XPS M1330

The M1330 creates a portable entertainment environment you can enjoy how, when and where you want: * Use the HDMI output to connect your notebook to a high-definition plasma or LCD TV. Grab the included remote, lean back and control your system from the comfort of your favorite chair * Dual headphone jacks to share with

read more | digg story

Friday, November 23, 2007

Tomb of the Unknown Soldiers Monument - Baghdad

We we're given the oppurtunity to visit the Tomb of the Unknown Soldiers.
For an overview of this monument, here's what I've got from wikipedia . . .

The Monument to the Unknown Soldier is said to be inspired by the glorification of a martyr from the Iran-Iraq war. What looks like to many as a flying saucer frozen in midflight, represents a traditional shield (dira¹a) dropping from the dying grasp of an Iraqi warrior. The monument also houses an underground museum. The artificial hill is shaped like a low, truncated cone of 250 m diameter [1]. It is surrounded by slanting girders of triangular section that are covered with marble. Red granite, stepped platforms of elliptical form lead to the dome and cubic sculpture. The steel flagpole is entirely covered with Murano glass panels fixed on stainless steel arms and displaying the national flag colours. The cantilevered dome is 42m in diameter and follows an inclination of 12 degrees. Its external surface is clad with copper, while its inner surface features a soffit finished with pyramidal modules alternating steel and copper. The promenade is covered by a semi-circular, flat roof supported on a triangular steel bracing. The roof is covered with a copper sheet and the soffit displays V-shaped panels of stainless steel and Murano glass.




Static images can be viewed here.

Saturday, November 17, 2007

MindManager and MS Office Project Connect to Create Project Management Tool

United by ProjectLINKER 2008, developed by Wodey Informationssysteme, Bonn, Germany, the leading business mapping software, Mindjet MindManager is elegantly coupled to Microsoft Office Project 2007, enabling enterprise teams better visibility and predictability earlier in the project management process.

read more | digg story

Thursday, November 15, 2007

Managing the Outsourced Project

This is a great article on project daily about project management. Project daily provides a lot of awesome information on the latest and greatest from the project management market.

read more | digg story

Saturday, November 10, 2007

Baghdad Boy 4 - Pic to remember

With Captain Javier Velasquez, USAF.




FREE Project Management Training

Here you can have basic Project Management training FREE. You can also find valuable resources and information on effective project management software, templates and many more.

read more | digg story

Friday, November 9, 2007

A Support for Gov. Panlilio

A letter for support to Pampanga Gov. Panlilio . . .

Dear Fellow Filipinos,

Good day to you!

Last October 13 , Governor Ed Panlilio of Pampanga came out to declare that he was given P 500,000.00 in cash which came from a Palace Staff Member in Malacañang. The money was allegedly given for baranggay projects and to support candidates for the upcoming baranggay elections. Since Gov. Panlilio's admission, there have been other local officials and congressmen who have admitted to receiving money from Malacañang as well. Up until today we still don't know where this money really came from.

But since then, Gov. Panlilio has been under fire because of doing the right thing. Right now, local officials in Pampanga led by Vice-Gov. Yeng Guiao are ganging up on him and marginalizing him by not respecting his authority as governor. Media Publications in Pampanga are even being used to destroy his credibility. If one looks at Gov. Panlilio's performance thus far in the less than 6 months that he has been in office, the results would speak for itself. He was able to raise the same amount of quarry taxes in less than 2 months compared to the former governor who raised the same amount in 1 year. Due to this, mayors and board members are now demanding part of this collection money and are blackmailing Gov. Panlilio by not passing important policies that will benefit the constituencies of Pampanga.

Isn't this a familiar refrain in our country? Someone does good and yet he is often punished for doing what is right? And worse, while this is happening many of us just turn a blind eye without doing anything. We s just shrug it off and move on with our lives. It is no wonder why majority of our government leaders are becoming bolder and bolder in becoming corrupt since for them no one would dare complaint about it. In short, we deserve the kind of leaders that we have because we continue to do nothing despite the fact that we see that there is something wrong. And this is why I am writing to appeal to you right now, I'd like to ask for a few minutes of your time to send an email of support to Gov. Ed Panlilio, let us all tell him that we are behind him in his quest for the Truth. What is at stake here is not only the people of Pampanga but the nation as a whole. Gov. Ed exposed what has long been happening in Malacañang and now he is being punished for it. Will you do something about it?

If yes, then please send an email of support to Gov. Ed Panlilio at wesupportgovpanlilio@gmail.com and please help us by forwarding this email to all your friends. We will print the emails that you send and give it to Gov. Panlilio to show him that he is not alone in his quest for the Truth. Let us show the world that the Filipino people will not just allow another Good Man to fail and let evil prevail.

Thank you for your time! May you have a pleasant day!

Sincerely,

Harvey S. Keh
Director for Youth Leadership and Social Entrepreneurship
Ateneo de Manila University-School of Government

SoftPerfect Network Scanner




SoftPerfect Network ScannerSoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and several advanced features. It is intended for both system administrators and general users who are interested in computer security. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden).

In addition, it allows you to mount shared folders as network drives, browse them using Windows Explorer, filter the results list and more. SoftPerfect Network Scanner can also check for a user-defined port and report back if one is open. It can also resolve host names and auto-detect your local and external IP range. It supports remote shutdown and Wake-On-LAN. Click here for more information.

Having fun with Windows Vista


How I wish that Linux is always part of every company but the reality is not. I'd love to do Linux stuff but I can't apply it at work. I've been in the IT industry for the last 7 years and windows is always 1 step ahead (in my part of this internet world). Companies will always prefer windows eventhough it's expensive. Lately I spent most of my time fixing lots of incompatibilities on windows vista home premium and other apps such as skype or skype against IE7. Issues were not encountered when skype was not around. Since skype is really a requirement, I have no choice but to downgrade windows vista home premium to windows xp professional service pack 2 which is very stable right now. Hopefully Microsoft will release (soon) the first service pack for Vista. Another thing is I cant uninstall IE7 attempting to replace it with IE6 SP1.Windows at work . . . Linux by heart . . .

BeaSeanDwayneRenzy

How time flies . . . and now we're parents having kids :. Just a mix of Sean's Pics together with his cousins' Dwayne, Bea and Renzy (I don't know if i spell it right).

Baghdad Boy 3

Some images on how we live life in the International Zone. We don't have a weekend here. The only rest that we have is on Friday mornings. We have a pool table inside the villa. It's good that wii was available at PX and we have another entertainment. We work 12 hours a day and even more. It's good that we can blog and there's internet. Most of the companies here is relying on satellite internet which is very expensive and it's hard to find a reliable internet source.

Friday, November 2, 2007

Wii Be Healin'


One of the latest crazes to hit the Wii world is rehab using the Wii console, known as Wii-hab.

read more | digg story

Wednesday, October 10, 2007

Amazing XP Tools to Arm your PC from Hackers.

Hackers have newer methods to hack into your systems.They are smart enough to detect security loop holes in your PC and enter through open ports,unencrypted Wi-Fi connections,malicious websites or internet servers.I

read more | digg story

Tuesday, October 9, 2007

London Bridges


My first novel of James Patterson and second encounter with Agent Alex Cross. The first one was with the movie along came a spider where Alex Cross was portrayed by Morgan Freeman.

Alex Cross is back in his tenth and most explosive adventure yet.

In broad desert daylight, a mysterious platoon of soldiers evacuates the entire population of Sunrise Valley, Nevada. Minutes later, a huge bomb detonates a hundred feet above the ground and lays waste to homes, cars, and playgrounds: a town annihilated in an instant.

And so is the Wolf
Alex Cross is on vacation in San Francisco with his girlfriend, Jamilla Hughes, when he gets the call. The Russian supercriminal known as the Wolf claims responsibility for the blast. The Wolf is the deadliest nemesis Cross has ever faced, and the fact that he is still at large is agonizing for him and his new bosses at the FBI.

And so is the Weasel
Major cities around the globe, including London, Paris, and New York, are threatened with total destruction. The Wolf has proven he can do it - the only question is who can stop him in time. Surveillance film of the blast reveals the presence of another of Alex Cross's most dangerous enemies, the ruthless assassin known as the Weasel. The thought of these two dark geniuses joining forces makes Alex's blood run cold.

Now are you scared?

World leaders have just four days to prevent an unimaginable cataclysm. In a matter of hours, Cross is catapulted into an international chase of astonishing danger. Joining forces with Scotland Yard and Interpol, Alex fights his way through a torrent of false leads, impersonators, and foreign agents before he gets close to the heart of the crimes. Racing down the hairpin turns of the Riviera in the most unforgettable finale James Patterson has ever written, Alex Cross confronts the truth of the Wolf's identity - a revelation that even Cross himself may be unable to survive.


Sunday, October 7, 2007

GMANews.TV - Davao City looms as free Wifi zone - report - Infotech - Official Website of GMA News and Public Affairs - Latest Philippine News - BETA

GMANews.TV - Davao City looms as free Wifi zone - report - Infotech - Official Website of GMA News and Public Affairs - Latest Philippine News - BETA

The Wi-Fi Detector T-shirt



This t-shirt is actually no normal tshirt. Its a “Wi-Fi Detector Shirt” which actually displays the signal from 802.11b/g with glowing bars on the front.It doesnt actually check for open networks which would make this a killer product…but its still pretty damn cool in a geek way!

read more | digg story

Friday, October 5, 2007

Installing Ubuntu Or Fedora From A Windows Or Linux System With UNetbootin

UNetbootin is a tool that allows you to install various Linux distributions (Ubuntu, Fedora, Mandriva, OpenSuSE, Debian, ArchLinux) from a Windows or a Linux desktop over the internet (i.e., you don't need to burn any CDs). In the end, you have a dual-boot system (Linux/Windows or Linux/Linux).

read more | digg story

Thursday, October 4, 2007

Filipinos Denigrated on ABC's Desperate Housewives

Some letter/reactions on Filipinos denigrated on ABC's Desperate Housewives.

To the producers of “Desperate Housewives” and ABC:

We are writing to express concern and hurt about a racially-discriminatory comment made in an episode of Desperate Housewives on 9/30/07. In a scene in which Susan was told by her gynecologist that she might be hitting menopause, she replied, “Can I just check those diplomas because I just want to make sure that they are not from some med school in the Philippines.”

As members and allies of the Filipino American community, we are writing to inform know that this type of derogatory remark was discriminatory and hurtful, and such a comment was not necessary to maintain any humor in the show. Additionally, a statement that devalues Filipinos in healthcare is extremely unfounded, considering the overwhelming presence of Filipinos and Filipino Americans in the medical field. Filipinos are the second largest immigrant population in the United States, with many entering the U.S. (and successfully passing their U.S. licensing boards!) as doctors, nurses, and medical technicians. In fact, the Philippines produces more U.S. nurses than any other country in the world. So, to belittle the education, experience, or value of Filipino Americans in health care is extremely disrespectful and plain and simply ignorant. Many of the hospitals in major metropolitan areas of the U.S. (and the world) would not be able to operate without its Filipino and Filipino American staff members.

As Filipino Americans and allies, we band together to ensure that this type of hateful message should not be allowed to continue on our television and radio airwaves. Given the recent amounts of media attention that has been given to Michael Richards (against African Americans), Isaiah Washington (against gays), and Rosie O’Donnell (against Asian/ Chinese Americans), it is ridiculous that this type of hateful speech made it through various screenwriters, the show’s producers, the show’s actors, and ABC itself.

We demand a public apology to the Filipino American community, and we demand the episode be edited to remove the ignorant and racist remark. We will not allow hateful messages against our community (or any other oppressed community) to continue.

Sincerely,

The Undersigned

Monday, October 1, 2007

Five Common Misconceptions About Linux

1. Linux is Behind the Times ...Wrong2. Linux is Hard to Use ...Wrong3. Linux isn't Compatible with Anything ..WrongAnd finally 4. Linux isn't Enterprise Ready / No One Uses Linux ..Also wrong4. Linux isn't Enterprise Ready / No One Uses Linux ...Wrong

read more | digg story

Sunday, September 30, 2007

How to Unbrick a Bricked Unlocked iPhone: the JesusPhone Walks Again

Here's a very easy method to defeat Apple and bring your bricked unlocked iPhone back from death. If you have an unlocked iPhone and you updated to firmware 1.1.1, you now can revive and bring all your third-party applications back by following these steps to restore firmware 1.0.2. This has been confirmed by the Dev Team, we are testing now live.

read more | digg story

Saturday, September 29, 2007

GPMC Script Samples

Overview:
The Group Policy Management Console (GPMC) can be scripted by using a built-in COM object.

This package contains a great deal of script examples:
BackupAllGPOs.wsf
BackupGPO.wsf
CopyGPO.wsf
CreateEnvironmentFromXML.wsf
CreateGPO.wsf
CreateMigrationTable.wsf
CreateXMLFromEnvironment.wsf
DeleteGPO.wsf
DumpGPOInfo.wsf
DumpSOMInfo.wsf
FindDisabledGPOs.wsf
FindDuplicateNamedGPOs.wsf
FindGPOsByPolicyExtension.wsf
FindGPOsBySecurityGroup.wsf
FindGPOsWithNoSecurityFiltering.wsf
findorphanedGPOsInSYSVOL.wsf
FindSOMsWithExternalGPOLinks.wsf
FindUnlinkedGPOs.wsf
GetReportsForAllGPOs.wsf
GetReportsForGPO.wsf
GrantPermissionOnAllGPOs.wsf
ImportAllGPOs.wsf
ImportGPO.wsf
ListAllGPOs.wsf
ListSOMPolicyTree.wsf
QueryBackupLocation.wsf
RestoreAllGPOs.wsf
RestoreGPO.wsf
SetGPOCreationPermissions.wsf
SetGPOPermissions.wsf
SetGPOPermissionsBySOM.wsf
SetSOMPermissions.wsf
SampleEnvironment.xml
ScriptingReadme.rtf
SampleMigrationTable.migtable
Lib_CommonGPMCFunctions.js

System requirements:
Windows Server 2008 or Windows Vista

Download here

Thursday, September 27, 2007

Windows Script 5.7 released!

Microsoft just gave us an updated version of the Windows Script engine that we all love so much... This version brings very few additions, but great many fixes.

From release notes:
This release of Windows Script brings the improvements in scripting made during the Vista development cycle to downlevel platforms. During any release cycle we test with increasingly effective analysis tools designed to expose stability problems, memory leaks, and potential security weaknesses in code. The results from this testing comprise the vast majority of changes. Of course, we also include all the current security updates. This is the fastest, most robust, and secure release of Windows Script available.

Why Version 5.7?
The primary reason for changing the version number from 5.6 to 5.7 is to simplify servicing and support by synchronizing the versioning to a consistent scheme based on Vista build number. The minor version increase does not indicate significant new features. The scripting feature set is substantially the same as 5.6, with only minor additions.

What’s New
In addition to the general improvements noted above, the following are some of the notable changes in this release.

JScript
• This package includes the improved garbage collector (GC) shipped with Internet Explorer 7 and Vista. The new GC can dramatically improve the performance of applications that create large numbers of objects, such as Ajax-style web applications. These performance improvements are now available to users of earlier browsers.This work replaces and improves upon KB919237. If you have implemented KB919237, we recommend removing the registry keys.
• New progid JScript.Compact implements the JScript Compact Profile (ECMA 327). This is a profile of the ECMAScript language standard with a subset of features. See the ECMA 327 standard for more information.
• Update for new Daylight Savings Time rules.

VBScript
• VBScript defines a new global function GetUILanguage that returns the current default user interface language. This is the same value returned by the Windows API GetUserDefaultUILanguage. Script authors can now write code that is aware of the current user’s language preference.
• Fix crash when calling VBScript class objects from JScript.
• Fix problems with comparisons to NaN in some versions (KB901104).VBScript and JScript
• Support for large address space on machines with > 2GB RAM (KB890048)
• Improved stack checking makes script more robust in the face of stack overflows.
• Fix miscellaneous TLS leaks and memory leaks, including using the RegEx object with more than 10 sub-matches.Windows Scripting Host
• Fixed rare deadlocks in remote scripting. Prevents occasional hangs in remote scripts.
• Fixed propagation of error return codes in remote scripting. Error codes produced by remote scripts are more reliably returned to the client.
• Fixed attempting to load nonexistent wshenu.dll which created performance problem in login scripts.

Included KB’s
This release also contains fixes described in the following knowledgebase articles.
KB831191
KB834742
KB836863
KB890048
KB892296
KB901104
KB903648
KB906092
KB917344
KB919237 (superceded by new GC)
KB925753
KB933811
KB933812
KB933873
KB940284

Download here:
Windows Script 5.7 for Windows 2000
Windows Script 5.7 for Windows XP
Windows Script 5.7 for Windows Server 2003
Windows Script 5.7 Release Notes

Tuesday, September 25, 2007

Windows Server 2008 RC0 is out there!

It's so exciting - Windows Server 2008 RC0 is out there and ready to be downloaded!

Read the team blog here:
http://blogs.technet.com/windowsserver/

Download CTP here:
http://www.microsoft.com/windowsserver2008/audsel.mspx

.. go get it from Technet (if you are a subscriber).

Sunday, September 23, 2007

Baghdad Boy - The Environment

The Office and area of work is just beside the building where you rest. The company provides everything from food to laundry. The place is being surrounded with Concrete T Walls as protection against mortar attacks.A few months ago daily mortar attack was normal. Expect at least 35 drops a day. A nearby police station was hit by a mortar. It's good that spy planes was able to locate the origin of the attack and it was neutralized. A mortar was also found nearby but didn't do a bang and it was found out that it's made in Iran.

There's no weekend here, what I mean is, you can't expect to have a weekend since there's no place to go except the office, your room, a nearby PX, the only available place where you could get some personal stuff with a little choice of electronic gadgets and military supplies. Just like a 711 (larger version). There is always a body and car search everywhere you go, you need to turn off your phone and go to a bunker while they search the car for possible bombs. Phone with camera is not allowed at all. Although it can cause so much delay but it's good for everybody. The guards who usually do the body search were latinos.

Saturday, September 22, 2007

Baghdad Boy - Entry Point

As we all know that Filipinos are banned from entering Iraq as noted on the first page of a Filipino passport, "Not valid to travel to Iraq" but somehow Filipinos has "ways" and "means" on how to get to Iraq.

An early interesting experience was the route from Baghdad International Airport going to the so called International Zone or Green Zone, they said as the "safest" place in Baghdad. The escorts, personal security guys mostly ex military with tattooed arms. They will provide and let you wear bullet proof vest and give instruction in case under attack, that they are here to protect.

From Baghdad International Airport going to the International Zone is a 20 - 30 minutes ride on 4 car convoy equipped with radios and automatic weapons (AK47s, submachine guns and 9mms). The ride is on a Mercedes Benz with bullet proof doors. Distance between cars is always 100 meter apart. Along the way you could see lots of US Military on humvees in convoy. I cannot distinguish if they are US Marines or US Army and other groups of with personal body guards and having high end equiptments and hardwares. They said that the highway from Baghdad International airport going to IZ is the most dangerous highway on earth. They believe that there are snipers along the way and car bombers as well but I didn't know about it til I hear stories from other Filipinos who had been here for quite some time now. The adrenalin is high for a fresh meat like me. I don't know if I am scared or not. I've been asking myself if this is stupidity or just the call of opportunity to be here bringing myself to one of the most dangerous place on earth. I am here now doing my job. More experiences will be posted soon . . .

Sunday, September 9, 2007

Friday, September 7, 2007

The Teeth of the Tiger


Just finished this novel and somehow I was not able to let go of it. I was done with it in less than 36 hours. Truly I am a Clancy fan. Novel summary below is courtesy of wikipedia.
Prior to this I have read Without Remorse and The Cardinal of the Kremlin.

The Teeth of the Tiger is a 2003 techno-thriller novel by Tom Clancy. It is about an intelligence agency, called Hendley Associates, which is "off the books" and thus freed from the shackles of Congressional oversight. This agency was set up by Jack Ryan when he was President. It funds its operations by intercepting communications between the CIA and the NSA, and using the information gained to make money on the stock market.

Plot Summary

The novel begins with the assassination of a Mossad agent in Rome. Jack Ryan Jr., the son of former President Jack Ryan soon finds himself confronting the world of international terrorism in the post-9/11 world along with his twin cousins. "The Campus", the nickname for Hendley Associates, is an "off the books" intelligence agency. Created by the former president Jack Ryan, The Campus keeps itself funded by playing the stock market which allows them to prevent Congress from overseeing them and thereby allowing them to kill targets without legal constraints.

The Campus sends out a strike team that utilizes succinylcholine to execute terrorists. It's all training until a group of Islamic fundamentalists cross the U.S.-Mexico border with a crate of sub-machine guns and attacks suburban malls across the nation. Then the team goes across Europe killing the terrorists.

Characters in "The Teeth of the Tiger"


  • Jack [Shortstop] Ryan Jr – protagonist, son of Jack Ryan Sr.
  • Dominic "Enzo" Caruso – FBI agent brother in "the Campus"
  • Brian "Aldo" Caruso – US Marine brother in "the Campus"
  • Sally [Shadow] Ryan – Jack Ryan Sr's daughter
  • Katie [Sandbox] Ryan – Jack Ryan Sr's daughter, still in school
  • Gerry Hendley – former senator and friend of Jack Ryan Sr
  • Mohammed – one of key leaders in The Emir's organization

Thursday, August 30, 2007

Wednesday, August 22, 2007

IT Jobs Australia

This is the agency for the hiring of 2,000+ IT Jobs for Australia

Mabis International Services Inc.

POEA -035 - LB - 101306 - UL
2nd floor AMO building
No. 92 New York street Brgy. E. Rodriguez Sr.
Cubao Quezon City, Philippines 1102
Tel. No: (623) 911-9991
Telefax: (623) 911-1218
Mobile No. 0917-8401021
email:info@mabis-inc.com
email your resume: mabis_inc@yahoo.com
website: http://www.mabis-inc.com

Filipino Hospitality

I had some white wine with a friend of mine who just arrived for a vacation from working overseas as a seaman. He had some story to tell on how he got the white wine that we're having.

On his trip from Greece to Bahrain via Gulf Air he was seated near the aisle. Opposite on the aisle was a caucasian male. On the duration of the flight the caucasian male found out that his lampshade is not functioning properly. Somehow he is not happy with his situation since he had some things to do inflight and he badly needed the lampshade working. The flight attendant tried to fix the lampshade but still it won't work. So the lamp problem became an issue now between the flight attendant and the caucasian male and it's starting to catch some attention. As my friend noticed the commution he tried to open up his lamp and it seems working fine, so he decided to approach the flight attendant and told them that it's fine with him to swap places with the caucasian male if he like since he is not using the working lamp shade on his seat. The caucasian male agreed and they swap places and the issue was resolved.

Later on the duration of the flight, the manager of the flight attendants approach my friend thanking him for providing his place to the caucasian male. The manager was so grateful on what he did. In return the manager gave him some wine as a gift but he refused to have it, so he returned to his seat. But then the manager was insistent, he personally brought the bottles of wine into his place so he accepted it.

This is just another way of how Filipino hospitality happens when situation arises . . .

Monday, August 20, 2007

Bohol Feb 2007



Blog for this post can be viewed here

Upheaval

my vision of a 23rd century Erthean city, a blog at a time...this story was written by a classmate of mine in high school.

read more | digg story

Sunday, August 19, 2007

Wireless is "cool" again; Belkin N1 Vision, $200, aux. display, easy setup

Belkin's N1 Vision router offers an aux. display, 802.11n, and 4 gigabit ports packaged in an attractive glossy design for $200. This is one router grandpa, grandma, your parents, and in-laws can setup on their own.

read more | digg story

Friday, August 17, 2007

Hack Attack: Chat with AIM, MSN, Yahoo, and other contacts over Google Talk

Today I'll show you how to chat with all of your instant messaging buddies—with all the benefits of Gmail and web integration—using Google Talk as a universal chat application.

read more | digg story

Lifehacker's Top 10 PDF Tricks

Chances are you've already got a free PDF reader installed on your computer, but you can do a lot more with your PDF files than you might think. Hit the link for our top 10 list of techniques for converting, exchanging,sharing, managing and editing PDF documents

read more | digg story

6 Firefox Extensions for Web Workers

With thousands of extensions out there, your list may vary, but here’s my own selection of half a dozen essentials.

read more | digg story

Thursday, August 16, 2007

Antulang Beach Summer Outing - May 2007

Team Building Club Manila East - Aug 2006

Why I want to live in Davao

Aileen Apolo's thoughts and experiences of Davao City, Philippines. She really seems to want to transfer to this pearl of a city in the Philippine South -- and she is more than welcome, of course!

read more | digg story

Open Source Flash

OSFlash is a community-run resource site for open source Flash projects and tools.

read more | digg story

Streaming Flash Video with open-source software - a brief introduction

Flash video has several advantages over other formats, especially the fact that the Flash plugin comes pre-installed on most browsers. But until recently, the cost of streaming FLV using the Adobe Flash Media Server software has been an obstacle for many of us. Fortunately, there is now a FREE open source alternative to Flash Media Server: "Red5."

read more | digg story

Ubuntu Servers HACKED!

Ubuntu had to shutdown 5 of 8 production servers that are sponsored by Canonical, when they started attacking other systems. Canonical blames the community citing poorly maintained systems and bad administration practices. However the systems were not upgraded due to hardware incompatibility between the hardware Canonical sponsored and Ubuntu!!

read more | digg story

Wednesday, August 15, 2007

Windows Vista Installation

Windows Vista Memory Management

No More Hard Drive: 100 Free Apps to Go Online-Only

Why is it that despite the fact that you can do virtually anything from anywhere through the Net, most of us are still tethered to our computer because of the need for access to basic desktop software? In this article, we highlight 100 free webware apps which will help you cut the cord from your computer and its traditional desktop software.

read more | digg story

Linux Command-Line Cheat Sheet

This article is reprinted from The Official Ubuntu Book by Benjamin Mako Hill and Jono Bacon, with permission of publisher Prentice Hall Professional, copyright 2007, all rights reserved. While instructions are specific for Ubuntu Linux, most commands will work with other Linux distros.

read more | digg story

Tuesday, August 14, 2007

Brainstorming for bubbleheads, with Bubbl.us

It's like an outline, but with bubbles(Credit: CNET Networks)Josh covered the cool workgroup suite 8apps this morning. My favorite feature in it is the free-form brainstorming tool, Blueprint. Today, we received word of another brainstorming tool: Bubbl.us. It lets you create little thought bubbles and connect them together. You also can eas

read more | digg story

Communication Assertiveness



Monday, August 13, 2007

Two Choices



ONLINE BUSINESS TOOLBOX: 230+ Tools for Running a Business Online

Forget useless desktop apps and piles of paperwork: there are now thousands of small and medium-sized businesses managing all their affairs with online applications. After an exhaustive hunt this week, we’ve rounded up more than 230 of the leading online applications for super-productive companies.

read more | digg story

Bottled Water is Bad for the Environment

It takes 1.5 million barrels of oil a year just to make the plastic water bottles Americans use countless barrels to transport it from as far as Fiji and refrigerate it.

read more | digg story

Digg Widget


World Time

Freeware



Index ranks IT industries by nation - CNET News.com

More than 60 countries were scored on factors ranging from business environment and R&D efforts. How did the U.S. fare?Chart: World's top IT economies

read more | digg story

Technews

Tuesday, August 7, 2007

Virtual Box


I've been looking for some alternative for VMWare.A license for VMWare is required for it to be utilized legally. Definitely need to do some test on virtualbox so a comparison of features and performance can be made. The good thing with virtualbox is its free. Visit the site for more information about this product.

Thursday, July 26, 2007

Efficient Registry Cleanup

Posted on WindowsNetworking.com
This article will demonstrate how to script a registry cleanup or modification for all user profiles on a given computer – for instance to do a virus sweep. We will also see how this approach can be used together with a computer startup script within a computer Group Policy Object to modify all user profiles in the domain, site or OU. Yes, we can actually modify user registry settings by using a computer startup script…

In some cases you can be required to delete, add or modify some part of the registry – for all users on a computer at once. In most cases we would prefer to use a Group Policy Object (GPO) on the users to add or modify a given value, but when it comes to removing values we sometimes have to use scripts (unfortunately, you might say). Also, sometimes we want to perform a cleanup task in a single process without having to wait for all users to log on. This article will show how to do this in a fairly easy way.

We will see how it is possible to do the registry modification by using a very efficient registry script – and to combine this with a GPO on the machine level (startup or shutdown), instead of using a GPO on the user object (logon or logoff).

Read the rest of the article

Tuesday, July 24, 2007

WEBCEO

Installing again WEB CEO. I have utilized this tool before for optimizing websites. Now am planning to participate in the ongoing SEO Bayanihan contest which is being initiated by Marc. My objective in this exercise is to learn and bring back my skills (sharpening the saw) with SEO and as well to gauge my capability on this area. I already map out my domain for this contest and that would be http://paradisephilippines.relampagos.org but somehow godaddy admin page is down and I cannot update my cname record.

Lastly, the contest keyword for the Bayanihan SEO keyword ranking contest is paradise philippines, a testament to the beauty and splendor of our 7,000+ islands and the strong character and bayanihan spirit of Filipinos all over the world.

Saturday, July 21, 2007

KFMC Movement

Somethings didn't go well with my KFMC application. It seems that my movement wont push through for some reasons. A Minister in Saudi has temporarily block the entry of male applicants in favor of the local fresh graduates who are jobless at the moment. They have control over the entry of applicants. Urgh! am running out of resources . . .

iPhone Malware

Posted on Trend Micro Newsletter



THREAT LANDSCAPES

iPhone Malware

Technological convergence came full circle this month with the release of the iPhone, Apple's newest wonder gadget. Arguably the most anticipated product so far for 2007, the iPhone is a multimedia and Internet-enabled mobile phone that brings Apple into the mobile telecommunications market. While Apple plans to corner a one percent share in the global mobile phone market (roughly 10 million units) in its first year of availability, several analysts have forecasted even greater expectations given the iPod's amazing success.

With all the hype surrounding the iPhone, security researchers are waiting to determine whether it is secure enough to do more than just communicate and entertain. Similar smart phones have been affected by security issues ranging from malware to phishing activities. The platforms on which these mobile phones are running (such as Symbian, Palm, and Windows? Mobile) provide software development kits (SDKs) to third-party vendors so that they may create compatible applications. Hackers have easy access to these platform blueprints, enabling them to look for vulnerabilities they can exploit to create damaging malware.

Malware Used to "Sell" iPhones
Some malware creators leveraged the hype early without even creating malware for the device itself. On June 30, researchers reported the discovery of a pop-up ad that portends to sell an iPhone. Triggered when visiting Google.com or Yahoo.com, the Trojan generated a pop-up ad that referred would-be iPhone buyers to a phony website that resembled the Apple website. However, the malware authors took the money and the buyers received nothing in return.

A few days later, SDA Asia reported an email spam version of this malware. The malware tried to improve its chances of successful installation by exploiting over ten ActiveX vulnerabilities to install its malicious payload. Other features include use of XOR encryption and multiple fake Web sites to thwart detection.

iPhone on Safari
Apple developed the iPhone without releasing an SDK, meaning developers and hackers alike will not find it easy to develop applications or malware for the iPhone. However, days after its launch, Errata Security CEO Robert Graham reported that the iPhone contained one of the vulnerabilities found in the beta version of Apple's Safari 3 browser, which is included as a bundled application on the iPhone. This vulnerability, when successfully exploited, may allow a remote user to assume control of Safari 3 to execute code of choice.

Safari is the third most popular Web browser with almost 5% of market share as of May 2007 (according to Net Applications.com). Hours after the release of the Safari 3 Beta for Mac and Windows on June 12, independent security researcher Thor Larholm found a zero-day vulnerability relating to the URL protocol handler in the Windows version. Another independent security researcher, David Maynor of Errata Security, found six other vulnerabilities in the Windows version - four of which could allow denial of service (DoS) attacks, while the other two could allow remote code execution on the affected system.

Safari may be inflicted with future bugs, although in scaled-down versions on the iPhone. The bugs found on the Windows version of Safari may affect the iPhone version as loopholes in one version can easily be located on another. Furthermore, the iPhone runs on Mac OS X, which has several security issues of its own and it is likely that these will be encountered in the iPhone. These vulnerabilities may offset Apple's closed platform strategy, as they provide hackers with material to explore.

Conclusion
The Safari 3 and iPhone vulnerabilities combined with the malware events seem to tell the world that Apple products are popular enough to serve as prime targets for lucrative exploits and bugs. It would be wise to expect additional attacks in the future as the iPhone rolls out and availability and popularity increase.

Friday, July 20, 2007

The Purpose behind Internet Marketing Business Reviews

Starting your own Internet business can be a very daunting task but thankfully there are ways to make the process run a little smoother. Internet marketing business reviews are a great tool to find out which businesses are profitable and which ones to stay away from. With all of the scams and get rich quick schemes out there, it can be quite difficult to make an educated decision sometimes.

Most online business fail within only the first few months. A good reason for this is that people aren’t choosing the right type of businesses and also may not have done all the proper research before jumping in. Just like any other business, there is a certain amount of planning and preparation that needs to be done in order to make your online venture a success. A good place to start when planning your own business is Internet marketing business reviews.

These types of reviews go over in great detail the dos and don’ts of a successful online marketing campaign in order to prevent you from making the same mistakes others have in the past. They will provide you with information on which types on online business have been successful in the past and also be able to work with your current expertise to find the perfect solution for you.

Many people dream of being able to work from home but most think it’s an unattainable goal. However, with the Internet becoming larger by the day more and more people are discovering that it is not only possible but can be quite profitable as well. And no matter what your skill level with computers is, you are sure to be able to find something that is right up your alley. And Internet marketing business reviews are a great starting point.

The start up costs for a home Internet business are generally much lower than if you were to start a normal business. You don’t have to rent a building, at first you might not even need any staff other than yourself. As the business grows and you start bringing in more money, then you would probably have to hire someone. But at first, most Internet businesses are run just by one person.

One thing that an Internet marketing business review is helpful for is realizing the steps you are going to have to take to get started. You certainly won’t have to take out a huge loan or sell your house just to start a successful online business, which is something that many people don’t realize. They figure that to run a business from home to support yourself would have incredible start up costs. However it of course depends on the type of business you choose to run but in general, it does not cost a whole lot of money to get started at first.

Before jumping in feet first into the industry, it is absolutely imperative to conduct your research. The biggest mistake that people make is not doing the proper research before starting the business. And once the business gets started, they realize that there is so much other stuff that they didn’t take into consideration. Therefore consulting an Internet business marketing review is an absolutely crucial way to increase your chances of success. The dream of working from home does not have to just be a dream. With some planning, a little hard work and dedication your dream can quickly become a reality.

Wednesday, July 18, 2007

Anti Terror Bill

Draft as of May 4, 2005

Republic of the Philippines

HOUSE OF REPRESENTATIVES

Quezon City, Metro Manila

THIRTEENTH CONGRESS

First Regular Session

Bill No.

Introduced by the Committee on Justice and the Committee on Foreign Affairs

AN ACT

DEFINING TERRORISM, ESTABLISHING INSTITUTIONAL MECHANISMS

TO PREVENT AND SUPPRESS ITS COMMISSION, PROVIDING PENALTIES

THEREFORE AND FOR OTHER PURPOSES

Be it enacted in the Senate and House of Representatives of the Philippines in Congress assembled:

SECTION 1.Short Title.- This Act shall be known as the "Anti-Terrorism Act of 2005:'

SEC. 2. Declaration of Policy. It is hereby declared the policy of the State to safeguard and protect the lives/properties and environment, promote the dignity of the people, and to strongly condemn terrorism as a crime against the law of nations and humanity. The State shall take all the necessary measures to prevent, suppress, and penalize terrorism in all its forms. It shall continue to respect and promote the values, rights and freedom enshrined in the Philippine Constitution. Consistent with its foreign policy, the State shall extend cooperation and undertake mutual assistance with oilier States and international organizations in the investigation, apprehension and prosecution of persons involved in terrorism.

SEC. 3. Terrorism. - Terrorism is the premeditated, threatened, actual Use of violence, force, or by any other means of destruction perpetrated against person/s, property/ies, or the environment, with the intention of creating or sowing a slate of danger, panic, fear, or chaos to the general public, group of persons or particular person, or of coercing or intimidating the government to do or abstain from doing an act.

SEC. 4. Terrorism; How Committed. -Terrorism is committed by any person or group of persons, whether natural or juridical, who, with intent to create or sow danger, panic, fear or chaos to the general public or a group of persons or particular person, or to coerce or intimidate the government to do or to abstain from doing an act through the premeditated, threatened, or actual use of force, violence or oilier means of destruction, commits any of the following acts:

(1) Threatening or causing death or serious bodily harm (on person or persons),

(2) Threatening or causing serious risk to health or safely of (the public or any segment of the public;

(3) Threatening or causing substantial damage or wanton destruction or resorting to arson on critical infrastructure or property, public or private;

(4) Threatening or causing serious interference with or serious disruption of an essential service, facility or system, whether public or private, other than a result of lawful advocacy, protest, dissent or stoppage of work;

(5) Hijacking or threatening to hijack any kind of aircraft, electric or railroad train, locomotive, passenger bus or oilier means of mass transportation, or public conveyance, or piracy of ship or sea vessel;

(6) Taking or threatening to kidnap or deprive any person of his/her liberty;

(7) Assassinating or threatening to assassinate, or kidnapping or threatening to kidnap the President or the Vice President of (lie Philippines, the President of the Senate, the Speaker of the Mouse of Representatives or the Chief Justice of the Supreme Court}

(8) Killing or violently attacking an internationally protected person or depriving the liberty of such person in violation of the Convention on the Protection and Punishment of Crimes Against Internationally Protected Persons, including Diplomatic Agents, and oilier international agreements;

(9) Attacking or threatening to attack the cyberspace, by destroying the actual machinery of the information and communication infrastructure, disrupting the information technology underlying the internet, government or private networks or systems, or committing any unlawful act against networks, servers, computers or other information and communication systems;

(10) Willfully destroying the natural resources in land, water and air, such as forests or marine and mineral resources, or intentionally causing oil or toxic spillages, or other similar acts of destruction against the environment that threatens ecological security;

(11) Unlawfully manufacturing, processing, selling, acquiring, possessing, using, diverting, supplying or transporting chemical, biological, radiological or nuclear agents, or equipment and instruments used in their production, distribution, release or spread that would endanger directly or indirectly the safety of one or more individuals, or to cause mass destruction or great damage to property; or

(12) Unlawfully manufacturing, selling, acquiring, supplying, disposing, using or possessing explosives, bombs, grenades, projectiles, devices or other lethal weapons, or substances or machinery used or intended to be used for the manufacture of explosives in furtherance of, or incident to, or in - connection with, an act of terrorism defined herein.

Any person who commits any act of terrorism shall suffer the penalty of life imprisonment and a fine of Ten Million Pesos (Flip 10,000,000.00): Provided, That, if an act of terrorism should result in the death of a person, or if committed with the use of uniform, paraphernalia, communication equipment, or other implements peculiar to the armed-forces or other-law enforcement agencies, or if the offender is a government official or-employee or has retired, resigned, dismissed or otherwise separated from the government service, the penalty of death shall be imposed.

SEC.5. Conspiracy or Proposal to Commit Terrorism. - There is a conspiracy to commit terrorism when two or more persons come to an agreement to commit any act of terrorism as defined herein and decide to commit it.

There is proposal to commit terrorism when any person who has decided to commit any act of terrorism as defined herein proposes its execution to some other person or persons.

The conspiracy or proposal to commit any act of terrorism shall be punished by imprisonment of not less than six (6) years and one (1) day but not more than twelve (12) years and a fine of Five Million Pesos (Php 5,000,000.00); Provided, That if the person is a government official or employee or has retired, resigned, dismissed or otherwise separated from the government service, the maximum penalty and (lie accessory penalty of perpetual disqualification to hold public office shall be imposed.

SEC. 6. Inciting to Terrorism.- It shall be unlawful for any person or group of persons, natural or juridical, to incite others to the execution of any of the acts specified in Section 4 of this Act by means of speeches, proclamations, writings, emblems, banners or other representations tending to incite others to terrorism.

Any person who incites others to commit terrorism shall suffer the penalty of not less than six (6) years and one (1) day but not more than twelve (12) years and a fine of Five Million Pesos (Php 5,000,000.00): Provided, That, if the person is a government official or employee or has retired resigned, dismissed or otherwise separated from the government service, the maximum penalty and the accessory penalty of perpetual disqualification to hold public office shall be imposed.

SEC. 7. Acts that Facilitate, Contribute to or Promote Terrorism. - It shall be unlawful for any person or group of persons, whether natural or juridical, to knowingly, willfully and voluntarily facilitate, contribute to or promote terrorism through any of the following acts:

(1) Establishing, maintaining or serving as contact or link with any person or group of persons or organization/s who have pursued or are pursuing terrorism;

(2) Arranging or assisting in the conduct of meeting of two (2) or more persons, knowing that the meeting is to support or is in furtherance of terrorism;

(3) Participating in training and providing training facilities to any person or group of persons, organizations to carry out terrorism;

(4) Providing or offering to provide training, skill or expertise in furtherance of terrorism;

(5) Recruiting in order to facilitate or commit terrorism;

(6) Facilitating the entry or stay in the Philippines of aliens, knowing that the aliens have pursued or are pursuing terrorism;

(7) Facilitating, providing, soliciting or encouraging financial or material support for the commission of terrorism; or

(8) Harboring or concealing any person whom one knows or has reasonable ground to believe, to be the person who carried out any act slated in this Section or who committed or is likely to commit any act of terrorism.

Any person who commits any of the acts stared in this Section shall suffer the penalty of life imprisonment and a fine of Ten Million Pesos (P10,0000,000.00); Provided, That, if the act should result in the death of a person, or if such act was committed with the use of firearms or ammunition, or uniform, paraphernalia, communication equipment, or other implements peculiar to the armed forces or other law enforcement agencies, or if the offender is a public officer or employee, the death penalty shall be imposed.

SEC. 8. Proscription of Organization. - For the purpose of tins Act, an organization may be proscribed as terrorist organization by the Secretary of Justice upon the recommendation of the Anti-Terrorism Council created by this Act if such organization is characterized by any of the following:

(1) Any member or members thereof openly and publicly declares, admits, acknowledges, to have committed any of the acts punishable under this Act;

(2) Any member or members thereof have committed an act or acts of terrorism as defined and described in Sections 4, 5, 6 and 7 of tins Act;

(3) It is proscribed by the United Nations or other international organizations.

Proscriptions shall be published in the government gazette and major newspapers. Any proscribed organization or member thereof may move for de-proscription or de-listing before the Department of Justice (DOJ), whose decision is appeal able to the Court of Appeals.

SEC. 9. Membership in a Terrorist Organization. -Where an organization has been proscribed as a terrorist organization, it shall be unlawful for any person who knowingly, willfully, and by overt acts, affiliates himself, becomes, or remains a member of such organization unless he can prove a lack of personal knowledge of the organization's activities; or that he has not taken any part in the activities of the organization at anytime while it was proscribed; or that lie took immediate steps to terminate his membership there from as soon as practicable after it was proscribed; or that the organization was not declared a terrorist organization at the lime one became a member or begun to profess to be a member.

Any person convicted under this section shall suffer the penalty of imprisonment from not less than six (6 )years and one (1) day to not more than twelve (12)'years: Provided that, if the offender is a a government official or employee, or has retired, resigned, dismissed or otherwise separated from the government service, the maximum penalty and the accessory penalty of perpetual disqualification to hold public office shall be imposed.

SEC. 10. Making False Threats of Acts of Terrorism.- It shall be unlawful for any person to:

(1) Communicate or make available by any means, any information which he knows or believes to be false to another person with (he intention of inducing him or any other person a false belief that a terrorist act has been, is being or will be carried out; or,

(2) Place any article or substance in any place, or dispatch any article or substance by mail or by any other means of sending things from one place to another with the intention of inducing in another person a false belief that –

(i) the article or substance is likely to explode or ignite and thereby cause personal injury or damage to properly; or

(ii) the article contains or the substance consists of any dangerous, hazardous, radioactive or harmful substance; any toxic chemical; or any microbial or other biological agent, or toxin, that is likely to cause death, disease or personal injury or damage to property.

For purposes of subsections (1) and (2), a reference to a person inducing in another person a false belief does not require the first-mentioned person to have any particular person in mind as the person in whom lie intends to induce the false belief. The penalty of imprisonment for a period of not less than six (6) years and one (1) day to not more than twelve years and a fine of Fifty Thousand Pesos (Php 50,000.00) to One Hundred Thousand Pesos (Php 100,000.00) shall be imposed upon any person convicted under this Section. Provided that, if the offender is a government official or employee, or has retired resigned, dismissed or otherwise separated from the government service, the maximum penalty and the accessory penalty of perpetual disqualification to hold public office shall be imposed.

SEC. 11. Failure to Disclose Acts of Terrorism. — Any person, who, having personal knowledge or information of any acts punished under this Act, conceals or docs not disclose and makes known the same, as soon as possible to the government or any of its authorized agencies, shall suffer the penalty of imprisonment of not less than six (6) years and one (1) but not more than twelve (12) years and a fine of Fifty Thousand Pesos (Php 50,000.00) to One Hundred Thousand Pesos (Php 100,000.00): Provide , if the offender is a government official or employee, or has retired, resigned, dismissed or otherwise separated from the government service, the maximum penalty and the accessory penalty of perpetual disqualification to hold public office shall be imposed.

SEC. 12. Infidelity in the Custody of Prisoner. - Any public officer who, during his tour of duty, deliberately allows or connives in the escape of a prisoner under his custody or charge, who is accused of, or sentenced by final judgment for committing any of the acts punishable under this Act, shall suffer the penalty of imprisonment of not less than ten (10) years and one (1) day to not more than twelve (12) years. Furthermore, the accessory penalty of perpetual absolute disqualification to hold public office shall be imposed on the said public officer.

If the escape or evasion by such prisoner shall have taken place through the negligence of the public officer charged with the conveyance and custody of (lie said prisoner as the case may be, during his tour of duty, said public officer shall suffer the penalty of imprisonment of not less than eight (8) years and one (1) day to not more than eight (10) years, and the accessory penalty of perpetual absolute disqualification to hold public office.

SEC. 13. Criminal Liability of Officers of Partnership, Corporation, Association and other Juridical Person. -In case of any violation of this Act committed by a partnership, corporation, association, foundation or any juridical person, a partner, president, director, or manager who consents to or knowingly tolerates such violation shall be held criminally liable as co-principal. Provided that, the offending partnership, corporation, association, foundation or any juridical person shall either be penalized with a fine of not less than One Hundred Thousand (Php 100,000.00) Pesos to not more than Five Hundred Thousand Pesos (Php 500,000.00), or be dissolved or both, at the discretion of the Court.

SEC. 14. Arrest and Detention. Any peace officer or a private person may, without warrant, arrest a person: (a) when, in his presence, the person to be arrested has committed, is actually committing, or attempting to commit any of the offense under this Act; or (b) when any of said offense has in fact been committed and lie has reasonable ground to believe that the person to be arrested has committed the same.

Any person arrested under this Section may be detained for a period of not more than fifteen (15) days following his arrest.

The period of detention may be extended beyond fifteen (15) days if the person arrested without a warrant demands for a preliminary investigation and consents to it in writing and in the presence of his or her counsel. He shall be entitled to all other rights under Republic Act No. 7438, otherwise known as "An Act Defining Certain Rights of Persons Arrested, Detained, or Under Custodial Investigation."

The Commissioner of Immigration may detain without bail any alien charged with any act of terrorism penalized under this Act.

SEC. 15. Additional Penalty if Offender is an Alien. - In addition to the penalties herein prescribed, any alien who violates any of the provisions of tin's Act shall be deported without further proceedings immediately after service of sentence.

SEC. 16. Immunity from Prosecution.- Any person who serves as a witness for the government or provides evidence in a criminal case involving any violation of this Act, or who voluntarily or by virtue of a subpoena ad testificandum or subpoena duces tecum, produces, identifies or gives testimony on, but not limited to books, papers, documents, tapes containing words, sounds, pictures or images, photos, maps, diagrams, sketches, recordings, disc or any other form of written, recorded, or real evidence; shall be immune from any criminal prosecution, subject to the compliance with the provisions of Presidential Decree No. 1732, otherwise known as "Decree Providing Immunity from Criminal Prosecution to Government Witnesses" and the pertinent provisions of the Rules of Court.

SEC., 17. Witness Protection; Reporting Leading to Arrest and Conviction of Terrorists. -Any person who provides material information, whether testimonial or documentary, necessary for the investigation or prosecution of individual or group of organization of individuals accused of committing any of the offenses under this Act shall be entitled to the protection and subject to the obligation imposed under the Witness Protection Program pursuant to Republic Act No. 6981.

SEC. 18. Applicability of Republic Act No. 9160, as amended by Republic Act No. 9194.— Terrorism and other violations of this Act shall be considered unlawful activities under RA 9160, otherwise known as the "Anti-Money Laundering Act of 2001," as amended.

Upon determination that a reasonable ground to suspect exists dial any monetary instrument or property is in any way related to terrorism and other violations under this Act, the Anti-Money Laundering Council (AMLC) may issue a freeze order, which shall be effective immediately, on the said monetary instrument/s and/or properties fur a period not exceeding ninety (90) days unless extended by the Court of Appeals. Notice to the purported owner/s that his/their monetary instrument/s and/or properly has/have been frozen shall be issued simultaneously with the issuance of the freeze order. The purported owner/s of the monetary instrument/s and/or property shall have three (3) working days upon receipt of the notice to explain why the free order should be lifted. The AMLC has three (3) working days to resolve the freeze order case from receipt of the purported owner/s' explanation. If the AMLC fails to act within three (3) working days from the receipt of the said purported owner's explanation, the freeze order shall automatically be dissolved.

A freeze order 'shall stop all movements or transactions of or involving the monetary instrument/s and properly. In cases where checks drawn against a bank account subject of a freeze order were issued within fifteen (15) days prior to the issuance of the freeze order, the freeze order shall likewise result in the automatic cancellation and stop payment thereof. All movements or transactions, irrespective of the amount involved, occurring within the same period shall be reported to the AMLC.

Provided, that deposits or investments with any banking institutions or non-bank financial institutions may be inquired into or examined without prior court order pursuant to RA 9160, as amended: Provided, further, That any person of covered institution knowing that any money, instrument, or property or its proceeds, represents, involves, or relates to terrorism or the furtherance thereof and fails to report the same as suspicious transaction to the AMLC shall be criminally liable pursuant to Section 13 of this Act.

SEC. 19. Communication Assistance/or Law Enforcement Agencies. –

(a) The provisions of Republic Act No. 4200, otherwise known as the "Anti-Wire Tapping Act" to the contrary notwithstanding, any peace officer may apply ex parte before the executive judge of any Regional Trial Court for an order, or extension of such an order, requiring a provider of wire or electronic communication service to provide intercepted communication and call identifying information to law enforcement agencies, or authorizing or approving the installation, use and/or retrieval of surveillance device, in connection with an investigation for any offense punishable under this Act.

(b) For purposes of this Act, a surveillance device shall include but not limited to the following:

1) Data surveillance device or program capable of being used to record or monitor the input of information into, or the output of information from, the computer;

2) Listening device capable of being used to overhear, record, monitor or listen to a conversation or words spoken to or by any person in conversation, but does not include a hearing aid or similar device used by a person with impaired hearing to overcome the impairment and permit that person to hear only sounds ordinarily audible to the human ear;

3) Optical surveillance device capable of being used to record visually or observe an activity, but does not include spectacles, contact lenses, or similar device used by a person with impaired eyesight to overcome that impairment;

4) Electronic tracking device capable of being used to determine or monitor the location of a person or an object or the status of an object;

5) Pen register capable of recording or decoding electronic or other impulses which identified the numbers dialed or otherwise transmitted on the telephone line to which such device is attached, but such term does not include any device used by a provider or customer of a wire or electronic communication service for billing, or recording as an incident to billing, for communication services provided by such provider or any device used by a provider or customer of a wire communication service for cost accounting or other like purposes in the ordinary course of its business;

6) Trap and trace device capable of capturing the incoming electronic or other impulses which identify the originating number of an instrument or device from which a wire or electronic communication was transmitted; or

7) A device that is a combination of any two or more of the devices referred to in paragraphs (1) to (6) of this Section.

(c) When peace officer has certified that the information likely to be obtained by such interception, installation or use is relevant to an ongoing investigation for any offense punishable under this Act, the court shall issue an ex parte order requiring a provider of wire or electronic communication service or authorizing the installation, use and/or retrieval of the devices applied for, for a period not to exceed sixty (60) days. An extension of such an order may be granted, provided that such extension shall not exceed sixty (60) days.

Such order shall state one or more of the following -

(1) the premises to be subjected to surveillance;

(2) the use of surveillance device in or on a specified object or class of object;

(3) the use of surveillance device with respect to the conversations, activities/or location of a specified person or a person whose identity is unknown;

(4) the order be sealed until otherwise ordered by the court;

(5) the person using the line to which the device is to be attached, or the company who has been ordered by the court to provide assistance to the" applicant, -not to disclose the existence of the device or the existence of the investigation to the listed subscriber, or to any other person, unless or until otherwise ordered by the court.

(6) the provider of wire or electronic communication service to provide intercepted communication and call identifying information to the peace officer; or

(7) the entry into the premises, and into oilier specified premises adjoining or providing access to the premises, in order to install or retrieve the surveillance device.

(d) A provider of wire or electronic communication service, landlord, custodian, or other person shall install or assist in the installation of such device forthwith on the appropriate line and furnish such peace officer forthwith all information, facilities, and technical assistance necessary to accomplish the installation, use and/or retrieval of the device unobtrusively and with a minimum of interference with the services that the person so ordered by the court, accord the party will respect to whom the installation, use and/or retrieval is to take place, if such assistance is directed by a court order.

(e) Unless otherwise ordered by the court, the information obtained by the device shall be furnished to the peace officer designated in the court order, at reasonable intervals during regular business hours for the duration of the order.

(f) Any person who discloses information obtained, gathered or acquired pursuant to this Section, for the purpose other than that for which it was authorized, shall suffer the penalty of imprisonment of not less than six (6) months and one (1) day to not more than six (6) years: Provided, That, if the offender is a government official or employee or has retired, resigned, dismissed or otherwise separated from the government service, the maximum penalty and the accessory penalty of perpetual disqualification to hold public office shall be imposed.

(g) A court order shall not be required to authorize the installation, use or retrieval of surveillance device in any case where a peace officer, in connection with an investigation for any offense punishable under this Act, obtains the written consent of a party to the communication to be monitored or recorded in connection with any offense punishable under this Act.

(h) No cause of action shall lie in any court against any provider of a wire or electronic communication service, its officers, employees, agents, or oilier specified persons for providing information, facilities, or assistance in accordance with the terms of a court order under this Act. A good faith reliance on a court older under this Act, is a complete defense against any civil or criminal action brought under this Act or any oilier law;

(h) Any communication, written or spoken word, conversation, discussion, information, photos, or data taken, obtained or acquired in violation of this Section shall not be admissible as evidence in any judicial, quasi-judicial, legislative or administrative hearing or investigation.

(i) Any person who hinders, obstructs or otherwise prevents the peace officer from performing his duties stated in Section 21 of this Act shall suffer the penalty of imprisonment of not less than six (6) months and one (1) day to not more than six (6) years: Provided, That, if the offender is a government official or employee or has retired, resigned, dismissed or otherwise separated from the government service, the maximum penalty and the accessory penalty of perpetual disqualification to hold public office shall be imposed.

SEC. 20. Seizure of Vehicle, Vessel, Aircraft, Equipment, or Other Property or Instrument.- Any vehicle, vessel, aircraft, equipment, or oilier property or instrument used in furtherance of, or incident to, or in connection with any act of terrorism as defined in this Act shall be presumed prima facie evidence to have been unlawfully used n furtherance of or incident to or in connection with any act of terrorism as defined in this Act, and shall carry with it the confiscation and forfeiture thereof, in favor of the government, including but not limited to all the proceeds of the crime, such as money and other assets obtained thereby and instruments or tools with which it was committed unless they are property of third person not liable for the offense and who docs not knowingly authorize, tolerate or consent the use of the same.

SEC. 21. Prosecution of and jurisdiction Over Cases Involving Terrorism and Terrorist Activities.- The Regional Trial Court shall have jurisdiction to try all offenses punishable under this Act.

Any person may be charged with or convicted of any offense punishable under "Sections 4, 5, 6 and 7 of this Act without prejudice to the prosecution of any act or acts penalized under the Revised Penal Code or oilier special laws provided that such act or acts are not absorbed in the offense charged.

When there is a variance between the offense charged in the complaint or information, and that proved or established by the evidence, the accused shall be convicted of the offense proved included in the charge if the intent to create or sow a state of danger, panic or chaos to the general public or group of persons or particular persons was not proven during the trial. No person, however, shall be twice put in jeopardy of punishment for the same offense.

SEC. 22. Non-Applicability of Probation and Plea-Bargaining;. The provisions of the Probation Law or Presidential Decree No. 908, as amended, shall not be applicable for offenses punishable under this Act. Neither hall the provisions on pica bargaining provided for in the Rules of Court be made applicable to offenses punishable by this Act.

SEC. 23. Mutual Assistance and Cooperation Between the Philippines and Other States or International Organizations. -When a foreign State or International Organization makes a request for assistance concerning any matter related to any act of terrorism, the Council as created under Section 24 of this Act shall take the appropriate action on the matter, provided that such request of the Philippine Government to a foreign State or International Organization shall be coursed through the Council.

SEC. 24. Anti-Terrorism Council.- There is hereby created an Anti-Terrorism Council under the Office of the President, which shall serve as the central policy-making, coordinating, supervising and monitoring body of the government on all matters of domestic and international terrorism. It shall be composed of the Executive Secretary as Chairperson and the National Security Adviser (NSA) as Vice Chairperson, with the following as members:

a. Secretary of Foreign Affairs;

b. Secretary of Justice;

c. Secretary of National Defense;

d. Secretary of the Interior and Local Government;

e. Presidential Adviser on the Peace Process;

f. Director General, National Intelligence Coordinating Agency; and

g. Others as may be designated by the President

The Council shall organize an Anti-Terrorism Command Center which shall direct, coordinate, supervise and monitor the implementation of various measures against terrorism. It shall be headed by the National Security Adviser as the National Coordinator and shall be staffed, among others, by personnel coming from various agencies of the government.

In addition to their regular functions, the following agencies shall provide technical and other necessary support to the Council: the Armed Forces of the Philippines (AFP); Philippine National Police (PNP); National Bureau of Investigation (N131); Philippine Drug Enforcement Agency (PDEA); Bureau of Immigration (BI); Office of the Civil Defense (OCD); Philippine Center on Transnational Clime (PCTC); Anti-Money Laundering Council (AMLC); Consular Office of the Department of Foreign Affairs; Office of Transport Security (OTS); Health Emergency Management Services (HEMS); Philippine Nuclear Research Institute (PNR1); Environmental Management Bureau (EMB); Security and Exchange Commission (SEC); Bureau of Customs (BOC); National Prosecution Service (NAPROSS); National Telecommunication Commission (NTC); Board of Investments (B01), Commission on Information and Communication Technology (CICT), Bureau of Trade Regulation (BTR), Office of the Muslim Affairs (OMA), National Commission on Indigenous Peoples (NCIP); and oilier agencies as maybe deemed necessary by the Council.

SEC. 25. Functions of the Council. - In pursuit of its mandate under the preceding section, the Council shall have the following functions:

a.Formulate a comprehensive program and establish institutional mechanisms, when necessary, to deter and prevent acts of terrorism to include, programs to prepare the government and the country to cope with nil forms of terrorist attacks and their consequences, such as, but not limited to, the use of chemical, biological, radiological or nuclear weapons, or oilier weapons of catastrophic effect;

b.Supervise and coordinate the implementation of government policies, plans and measures to prevent and suppress acts of terrorism;

c.Conduct policy researches and studies in addressing terrorism;

d.Direct and monitor the conduct of anti-terrorism and counter-terrorism measures and post-conflict actions to address the effects of terrorism;

e.Direct and monitor the immediate investigation and speedy prosecution of cases involving acts of terrorism and monitor the progress of such cases;

f.Transfer the-conduct of investigation of specific .cases from one law enforcement agency to another;

g.Establish a comprehensive data-base information systems and linkages on anti-terrorism and counter-terrorism operations and post-conflict actions;

h.Approve the grant of monetary rewards and incentives to informants who are willing to give vital information for the arrest of those who committed the acts of terrorism;

i.Recommend the inclusion of vital witnesses under the Witness Protection, Security and Benefits Program;

j.Keep records of its proceedings and decisions, and such records shall be subject to such security classifications as the Council may, in its sound discretion, direct to safeguard the national interest;

k.Recommend to the Department of Justice the proscription and de-proscription of terrorist organizations.

l.Call upon any department, bureau, office or oilier executive agency for assistance; and

m.Exercise such oilier functions as may be assigned by the President.

SEC. 26. Suppletory Application of the Revised Penal Code and Other Generator Special Laws.-The provisions of the Revised Penal Code and other general or special laws have a suppletory application to the provisions of this Act.

SEC. 27. Implementing Rules and Regulations. - Within sixty (60) days from the effectivity of this Act, the Anti-Terrorism Council shall promulgate the Implementing Rules and Regulations as may be necessary to ensure the efficient and effective implementation of the provisions of this Act.

SEC. 28. Extra-Territorial Application of this Act. The provision of Article 2(5) of the Revised Penal Code is hereby amended to include the crimes penalized under Sections 4, 5, 6 and 7 of this Act.

SEC. 29. Separability Clause.- If any provision or portion of this Act or the application thereof to any person or circumstances is declared to be unconstitutional or invalid, the other provisions or portions of this Act, and the application of such provision or section to other persons or circumstances, shall not be affected thereby.

SEC. 30. Amendatory Clause. - Republic Act No. 9160, as amended by Republic Act No. 9194, Republic Act No. 4200, Commonwealth Act No. 613, as amended, and P.D. 968 are hereby amended or modified accordingly.

SEC. 31. Repealing Clause. - All laws, decrees, executive orders, rules or regulations or parts thereof, inconsistent with (lie provisions of tin's Act arc hereby repealed, amended or modified accordingly.

SEC. 32. Effectivity.- This Act shall take effect fifteen (15) days after its publication in the Official Gazette or two (2) newspapers of general circulation.

Approved.