princess-sophia Posted February 29, 2004 Share Posted February 29, 2004 Tanong lang, puede bang ma peke ang annulment? kunyari lang, for the sake of fix marriage? Quote Link to comment
Butsoy Posted February 29, 2004 Author Share Posted February 29, 2004 hi! my grandfather has been a municipal trial court judge. he passed away 2 years ago, are their benefits that the heirs can claim like from gsis? i have heard that there are benefits from supreme court or ibp? is this true? any information about this? thanks yes its true... pm mo ako and tulungan ko sya sa IBP para sa death benefits nya... Butsoy Quote Link to comment
jopoc Posted February 29, 2004 Share Posted February 29, 2004 hello, i am looking for a few LAW STUDENTS who are residing in paranaque or at least the south of manila. we need help for a congessional candidate there come this elections. so i am preferrably looking for those who have taken election law. kindly PM me and ill tell the deatails. please place in your subject: ELECTIONS thanks Quote Link to comment
CyberRay Posted February 29, 2004 Share Posted February 29, 2004 Hi! I need your help. Everytime I launch outlook express, this error appears: msimn.exe has generated errors and will be closed by Windows. You will need to restart the program. How can i resolve this. ThanksIs your MS office updated bro?try updating it maybe that will solve the problem... Quote Link to comment
roxysnonie Posted February 29, 2004 Share Posted February 29, 2004 Specifications: AMD Athlon XP 2500PR Socket A CPU, 1.833GHz, QuantiSpeedTM Architecture: Yes; Operations per clock cycle: 9; Integer pipelines: 3; Floating point pipelines: 3; Full x86 decoders: 3; L2 cache size: 512KB (on-chip); Total on-chip full-speed cache: 384KB; Total effective on-chip full-speed cache: 384KB (exclusive); System bus speed: 333MHz; 3D Enhancement instructions: 3DNow!TM Professional. does the specs only refer to barton amd's? how to differentiate a barton amd to a standard issue? am thinking of getting an amd barton 2500... Quote Link to comment
deus Posted March 1, 2004 Share Posted March 1, 2004 Yes, the specs does refer to all barton core amd processors.Barton core athlons - XP2500+, XP2800+ (also has a thoroughbred core), XP3000+ and XP3200+. All barton cores have a 512KB L2 cache size.To verify a processor, you must run a cpu id detector e.g sisoftsandra.If your mobo supports it, try the athlon XP3200+ with 400Mhz FSB. Quote Link to comment
-=extreme=- Posted March 1, 2004 Share Posted March 1, 2004 Hi! I need your help. Everytime I launch outlook express, this error appears: msimn.exe has generated errors and will be closed by Windows. You will need to restart the program. How can i resolve this. Thanks Outlook Express is incorporated with Internet Explorer, better reinstall/download the latest internet explorer then it will automatically update also the outlook express. Quote Link to comment
yobobski Posted March 1, 2004 Share Posted March 1, 2004 ako din, try to help with your mac inquiries :mtc: Quote Link to comment
xcalibr Posted March 1, 2004 Share Posted March 1, 2004 Outlook Express is incorporated with Internet Explorer, better reinstall/download the latest internet explorer then it will automatically update also the outlook express. i already tried updating internet explorer but the problem still persists. i also tried uninstalling office 2000 and reinstalling it but still the error still appears. Quote Link to comment
Shambala Posted March 1, 2004 Share Posted March 1, 2004 Dude, if all the suggested options have not succeeded, I wld humbly suggest talk to the person where U purchased the software. If its a pirated one, well, I think we alreADY have aN answer. If not, then maybe they cld help u. I ahve heard b4 that un installing and re installing back is alreayd a good remedy. BUt since it didnt work, ..........go to where U purchased it. :mtc: Quote Link to comment
deus Posted March 1, 2004 Share Posted March 1, 2004 xcalibur, did you use a spyware cleaner program or uninstalled a program which has links to this software or modified the registry? Try completely removing outlook express, using uninstaller programs such as mcafee uninstaller before reinstallation and update. Or try to restore your PC system to a previous state when it was still functioning. I recommend you to make back-ups and copying them externally or on another drive before doing so. Quote Link to comment
roxysnonie Posted March 1, 2004 Share Posted March 1, 2004 anybody here with a usb pc to ericsson t68i computer cable i could borrow? highly appreciate it! Quote Link to comment
CyberRay Posted March 2, 2004 Share Posted March 2, 2004 RE: Netsky ------- Virus Outbreak Alert! Threatcon Level: 3 ------- This Alert Has Been Issued By C.S.A On: 3-01 -2004http://groups.yahoo.com/group/CyberSecurityAlerts Virus Name: W32.Netsky.D@mm W32.Netsky.D@mm is a mass-mailing worm that is a variant of W32.Netsky.C@mm. The worm scans drives C through Z for email addresses and sends itself to those that are found. The Subject, Body, and Attachment names vary. NOTE: Due to the large amount of this worm being distributed in the wild, CyberSecurityAlerts may increase the alert level to “Threatcon Level 4” for this worm within the next 12 hours.------------------------------------------------------------------ -Also Known As: WORM_NETSKY.D [Trend], W32/Netsky@MM [McAfee], W32/Netsky.D.worm [Panda], W32/Netsky-D [sophos] W32.Netsky.C@mm, W32.Netsky.gen@mm -Variants: W32 Worm -Infection Length: 17,424 bytes -Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows XP -Systems Not Affected: Linux, Macintosh, UNIX, Windows 3.x------------------------------------------------------------------ -Technical Details: When W32.Netsky.D@mm is executed, it performs the following actions:1. Creates a mutex named "[skyNet.cz]SystemsMutex." This mutex allows only one instance of the worm to execute.2. Copies itself as %Windir%\winlogon.exe. Note: %Windir% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location. 3. Adds the value: "ICQ Net" = "%Windir%\winlogon.exe -stealth" to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run so that the worm runs when you start Windows.4. Deletes the values:• Taskmon• Explorer• Windows Services Host• KasperskyAV from the registry keys:• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Notes:• Some of these registry key values are typically associated with the worms W32.Mydoom.A@mm and W32.Mydoom.B@mm.• The W32.Mimail.T@mm worm may add the registry key value "KasperskyAV." 5. Deletes the values:• System.• msgsvr32• DELETE ME• service• Sentry from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run6. Deletes the values:• d3dupdate.exe• au.exe• OLE from the registry key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run7. Deletes the value: System. from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices8. Deletes the registry keys:• HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\PINF• HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WksPatch Note: The worms W32.Mydoom.A@mm and W32.Mydoom.B@mm add a value to the first key, so that explorer.exe loads their backdoor components. 9. If it is 6:00am, 7:00am, or 8:00am on a Tuesday in March, 2004, the PC speaker will beep for a random period of time, at a random frequency.10. Scans the following file types on drives C through Z for email addresses:• .dhtm• .cgi• .shtm• .msg• .oft• .sht• .dbx• .tbb• .adb• .doc• .wab• .asp• .uin• .rtf• .vbs• .html• .htm• .pl• .php• .txt• .eml11. Uses its own SMTP engine to send itself to the email addresses it found above, sending to each address once. The worm uses the local DNS server (retrieved via an API), if available, to perform an MX lookup for the recipient address. If the local DNS fails, it will perform the lookup from the following list of hard-coded servers:• 145.253.2.171• 151.189.13.35• 193.141.40.42• 193.189.244.205• 193.193.144.12• 193.193.158.10• 194.25.2.129• 194.25.2.129• 194.25.2.130• 194.25.2.131• 194.25.2.132• 194.25.2.133• 194.25.2.134• 195.185.185.195• 195.20.224.234• 212.185.252.136• 212.185.252.73• 212.185.253.70• 212.44.160.8• 212.7.128.162• 212.7.128.165• 213.191.74.19• 217.5.97.137• 62.155.255.1612. The email has the following characteristics: From: <spoofed> Subject: (One of the following)• Re: Your website• Re: Your product• Re: Your letter• Re: Your archive• Re: Your text• Re: Your bill• Re: Your details• Re: My details• Re: Word file• Re: Excel file• Re: Details• Re: Approved• Re: Your software• Re: Your music• Re: Here• Re: Re: Re: Your document• Re: Hello• Re: Hi• Re: Re: Message• Re: Your picture• Re: Here is the document• Re: Your document• Re: Thanks!• Re: Re: Thanks!• Re: Re: Document• Re: Document Body: (One of the following)• Your file is attached.• Please read the attached file.• Please have a look at the attached file.• See the attached file for details.• Here is the file.• Your document is attached. Attachment: (One of the following)• your_website.pif• your_product.pif• your_letter.pif• your_archive.pif• your_text.pif• your_bill.pif• your_details.pif• document_word.pif• document_excel.pif• my_details.pif• all_document.pif• application.pif• mp3music.pif• yours.pif• document_4351.pif• your_file.pif• message_details.pif• your_picture.pif• document_full.pif• message_part2.pif• document.pif• your_document.pif13. The worm avoids sending email to addresses containing following strings:• skynet• messagelabs• abuse• fbi• orton• f-pro• aspersky• cafee• orman• itdefender• f-secur• avp• spam• ymantec• antivi• icrosoft -Additional Information:• Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.• If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.• Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.• Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.• Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.• Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.• Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched. Please Download And Update The Latest Virus Definitions/Signatures For Your Anti-Virus Program A.S.A.P! ------------------------------------------------------------------ Please Forward This Email To Your Friends And Colleagues To Notify Them Of The Current Outbreak Situation And Help Them Secure Their Computers. Thank You! To Receive Instant Email Alerts Like This, Please Visit And Sign Up With Our Group! C.S.Ahttp://groups.yahoo.com/group/CyberSecurityAlertsEmail: CSA@o2.ie Quote Link to comment
jason_lee Posted March 2, 2004 Share Posted March 2, 2004 Tanong lang, puede bang ma peke ang annulment? kunyari lang, for the sake of fix marriage? Mahirap yan sis.... Una pwde kang kasuhan ng Falsification of documents2ndly, when you do get a nullity of marriage....dapat me Certificate of finality.3rdly, me kopya pa ang Census at ang municipal hall where you got your marriage licensce. Kaya don't gamble...baka masabit ka...You might regret doing that. Quote Link to comment
-=extreme=- Posted March 3, 2004 Share Posted March 3, 2004 Architect with BTX for Better Routing, Thermals, and Structural Support Overview: the BTX Motherboard SpecificationWhen Ken Olson, chairman and founder of DEC made the above quote in 1977, he had no idea what a mainstay the computer would become. Today, desktop computers are used everywhere, from homes and offices, to libraries and Internet cafes. This widespread adoption of the computer by consumers and corporations has increased demand for a wider variety of applications and form factors for PCs. With this growing demand, desktop developers need a flexible set of building blocks to take advantage of the opportunities that these new usages present. Balanced Technology Extended (BTX) is a new interface specification that provides a common, flexible foundation, based on standards that can be used to build innovative desktop systems. Systems need to incorporate the latest performance technologies, yet still meet increasing thermal, power, structural, acoustic, and electromagnetic compatibility (EMC) requirements. The BTX specification provides new tools and design space (Figure 1) for developers to lay out desktop systems, whether designing small, compact systems or very large, expandable systems. BTX is also optimized for the newest desktop technologies, including PCI Express* and Serial ATA. http://www.intel.com/update/images/dt10031_g1.gif Balanced Technology ExtendedThe BTX desktop form factor is the latest specification created to address many of the design challenges facing developers, including balancing size, performance, features, and cost. The specification also helps developers extend the useful life of industry designs across products and over time. BTX also supports the implementation of a variety of innovative and high-performance technologies for desktop platforms. BTX offers many key advantages for developers, including: Low-profile options for motherboard component keep-out. The lower profiles make it easy to integrate options into slim-line or small form-factor systems. Optimized routing, layout, and thermal advantages with an inline core layout. The new layout offers a condensed system design and optimized airflow path for efficient system cooling. It also helps developers avoid obstructed airflow that must be forced around components, and helps provide adequate cooling to all components. Along with optimized airflow, the use of high-quality fans can allow developers to eliminate one or more fans from the system, which can reduce the acoustics and system size even further. Scalable board dimensions. Flexibility in board sizes allows developers to use the same components to design a variety of system sizes and configurations. A smaller, more efficient power supply can be used for ultra-small systems. Standard ATX 12V power supplies can be used for tower configurations. Optimized structural board-support mechanisms and mounting holes. The support features offer mechanical characteristics to support high loads—such as heavy heat sinks—and help keep them from flexing or damaging board components and traces during shipping and handling. These advantages make the BTX form factor a perfect choice for system designs, not just for today's PCs, but also for future system designs. PC Form FactorsThe term "form factor" is used in the computer industry in various ways. It is often used to refer to the overall size and shape of the system. However, it can also refer to the size and shape of the standard components that can be easily procured, but still allow developers to mix and match components to create a large range of system types and sizes. Such standardization lets developers differentiate a product line to fit the many usage models in the PC industry. Most developers are familiar with the ATX and microATX motherboard form factors that are used in the majority of PCs currently in the market. These form factors describe the size of a motherboard, board-component height restriction zones, and mounting holes—elements that interface with the chassis and power supply. For example, a microATX form factor motherboard is a motherboard that complies with the microATX form factor specification. A microATX form factor motherboard can be integrated into a 10 L chassis (microATX-size) or a 30 L chassis (ATX-size). The form factor (motherboard) for a 10 L, 20 L, or 30 L chassis can be the same, while the system configuration for each PC can be different. The BTX specification helps standardize the same common, mechanical interface described above for ATX and microATX. However, the difference is that the BTX specification was designed to encompass a family of board sizes for a range of system sizes. It's like having ATX, microATX, and FlexATX form factors all in one specification, but BTX can span an even wider range of system sizes with a common core board layout. BTX offers greater flexibility than ATX and microATX by supporting not only different board sizes, but also different system heights. There are two heights defined in the BTX specification for developers to use in their designs. The standard height is similar to the height defined in the ATX-family form factor. An additional, lower profile height is defined for use where it is important to reduce the overall size of the system. SummaryThe BTX specification offers developers a building-block approach for using components in systems from 6 L in volume up to standard desktop tower sizes. In addition, the BTX specification gives developers the opportunity to improve thermals, acoustics, motherboard routing, and structural support. BTX is also optimized for the newest desktop technologies, including PCI Express and Serial ATA. Developers can now download and review the specification, then begin working with their customers to review system tradeoffs and the new options available with BTX. Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.