Jump to content
  • Recently Browsing

    • No registered users viewing this page.

Free Legal Advice


Butsoy

Recommended Posts

hi!

 

my grandfather has been a municipal trial court judge. he passed away 2 years ago, are their benefits that the heirs can claim like from gsis? i have heard that there are benefits from supreme court or ibp? is this true? any information about this?

 

thanks

yes its true... pm mo ako and tulungan ko sya sa IBP para sa death benefits nya...

 

Butsoy

Link to comment

hello,

 

i am looking for a few LAW STUDENTS who are residing in paranaque or at least the south of manila. we need help for a congessional candidate there come this elections. so i am preferrably looking for those who have taken election law.

 

kindly PM me and ill tell the deatails. please place in your subject: ELECTIONS

 

thanks

Link to comment
Hi! I need your help. Everytime I launch outlook express, this error appears:

 

msimn.exe has generated errors and will be closed by Windows. You will need to restart the program.

 

How can i resolve this.

 

Thanks

Is your MS office updated bro?

try updating it maybe that will solve the problem... :lol:

Link to comment
Specifications:

AMD Athlon XP 2500PR Socket A CPU, 1.833GHz, QuantiSpeedTM Architecture: Yes; Operations per clock cycle: 9; Integer pipelines: 3; Floating point pipelines: 3; Full x86 decoders: 3; L2 cache size: 512KB (on-chip); Total on-chip full-speed cache: 384KB; Total effective on-chip full-speed cache: 384KB (exclusive); System bus speed: 333MHz; 3D Enhancement instructions: 3DNow!TM Professional.

does the specs only refer to barton amd's?

 

how to differentiate a barton amd to a standard issue?

 

am thinking of getting an amd barton 2500...

post-20-1078079152.gif

Link to comment

Yes, the specs does refer to all barton core amd processors.

Barton core athlons - XP2500+, XP2800+ (also has a thoroughbred core), XP3000+ and XP3200+. All barton cores have a 512KB L2 cache size.

To verify a processor, you must run a cpu id detector e.g sisoftsandra.

If your mobo supports it, try the athlon XP3200+ with 400Mhz FSB.

Link to comment
Hi! I need your help. Everytime I launch outlook express, this error appears:

 

msimn.exe has generated errors and will be closed by Windows. You will need to restart the program.

 

How can i resolve this.

 

Thanks

Outlook Express is incorporated with Internet Explorer, better reinstall/download the latest internet explorer then it will automatically update also the outlook express.

Link to comment
Outlook Express is incorporated with Internet Explorer, better reinstall/download the latest internet explorer then it will automatically update also the outlook express.

i already tried updating internet explorer but the problem still persists. i also tried uninstalling office 2000 and reinstalling it but still the error still appears.

Link to comment

Dude, if all the suggested options have not succeeded, I wld humbly suggest talk to the person where U purchased the software. If its a pirated one, well, I think we alreADY have aN answer. If not, then maybe they cld help u.

 

I ahve heard b4 that un installing and re installing back is alreayd a good remedy. BUt since it didnt work, ..........go to where U purchased it. :) :mtc:

Link to comment

xcalibur, did you use a spyware cleaner program or uninstalled a program which has links to this software or modified the registry?

 

Try completely removing outlook express, using uninstaller programs such as mcafee uninstaller before reinstallation and update.

 

Or try to restore your PC system to a previous state when it was still functioning. I recommend you to make back-ups and copying them externally or on another drive before doing so.

Link to comment

RE: Netsky

 

------- Virus Outbreak Alert! Threatcon Level: 3 -------

 

This Alert Has Been Issued By C.S.A On: 3-01 -2004

http://groups.yahoo.com/group/CyberSecurityAlerts

 

Virus Name: W32.Netsky.D@mm

 

W32.Netsky.D@mm is a mass-mailing worm that is a variant of

W32.Netsky.C@mm. The worm scans drives C through Z for email addresses

and sends itself to those that are found. The Subject, Body, and

Attachment names vary.

 

 

NOTE: Due to the large amount of this worm being distributed in the

wild, CyberSecurityAlerts may increase the alert level to “Threatcon

Level 4” for this worm within the next 12 hours.

------------------------------------------------------------------

 

 

-Also Known As: WORM_NETSKY.D [Trend], W32/Netsky@MM [McAfee],

W32/Netsky.D.worm [Panda], W32/Netsky-D [sophos] W32.Netsky.C@mm,

W32.Netsky.gen@mm

 

-Variants: W32 Worm

 

-Infection Length: 17,424 bytes

 

-Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me,

Windows XP

 

-Systems Not Affected: Linux, Macintosh, UNIX, Windows 3.x

------------------------------------------------------------------

 

-Technical Details:

 

When W32.Netsky.D@mm is executed, it performs the following actions:

1. Creates a mutex named "[skyNet.cz]SystemsMutex." This mutex allows

only one instance of the worm to execute.

2. Copies itself as %Windir%\winlogon.exe.

 

Note: %Windir% is a variable. The worm locates the Windows installation

folder (by default, this is C:\Windows or C:\Winnt) and copies itself to

that location.

 

 

3. Adds the value:

 

"ICQ Net" = "%Windir%\winlogon.exe -stealth"

 

to the registry key:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

 

so that the worm runs when you start Windows.

4. Deletes the values:

• Taskmon

• Explorer

• Windows Services Host

• KasperskyAV

 

from the registry keys:

• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

 

Notes:

• Some of these registry key values are typically associated with the

worms W32.Mydoom.A@mm and W32.Mydoom.B@mm.

• The W32.Mimail.T@mm worm may add the registry key value "KasperskyAV."

 

 

5. Deletes the values:

• System.

• msgsvr32

• DELETE ME

• service

• Sentry

 

from the registry key:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

6. Deletes the values:

• d3dupdate.exe

• au.exe

• OLE

 

from the registry key:

 

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

7. Deletes the value:

 

System.

 

from the registry key:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\

RunServices

8. Deletes the registry keys:

• HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\

InProcServer32

• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\

Explorer\PINF

• HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WksPatch

 

Note: The worms W32.Mydoom.A@mm and W32.Mydoom.B@mm add a value to the

first key, so that explorer.exe loads their backdoor components.

 

 

9. If it is 6:00am, 7:00am, or 8:00am on a Tuesday in March, 2004, the

PC speaker will beep for a random period of time, at a random frequency.

10. Scans the following file types on drives C through Z for email

addresses:

• .dhtm

• .cgi

• .shtm

• .msg

• .oft

• .sht

• .dbx

• .tbb

• .adb

• .doc

• .wab

• .asp

• .uin

• .rtf

• .vbs

• .html

• .htm

• .pl

• .php

• .txt

• .eml

11. Uses its own SMTP engine to send itself to the email addresses it

found above, sending to each address once. The worm uses the local DNS

server (retrieved via an API), if available, to perform an MX lookup for

the recipient address. If the local DNS fails, it will perform the

lookup from the following list of hard-coded servers:

• 145.253.2.171

• 151.189.13.35

• 193.141.40.42

• 193.189.244.205

• 193.193.144.12

• 193.193.158.10

• 194.25.2.129

• 194.25.2.129

• 194.25.2.130

• 194.25.2.131

• 194.25.2.132

• 194.25.2.133

• 194.25.2.134

• 195.185.185.195

• 195.20.224.234

• 212.185.252.136

• 212.185.252.73

• 212.185.253.70

• 212.44.160.8

• 212.7.128.162

• 212.7.128.165

• 213.191.74.19

• 217.5.97.137

• 62.155.255.16

12. The email has the following characteristics:

 

From: <spoofed>

 

Subject: (One of the following)

• Re: Your website

• Re: Your product

• Re: Your letter

• Re: Your archive

• Re: Your text

• Re: Your bill

• Re: Your details

• Re: My details

• Re: Word file

• Re: Excel file

• Re: Details

• Re: Approved

• Re: Your software

• Re: Your music

• Re: Here

• Re: Re: Re: Your document

• Re: Hello

• Re: Hi

• Re: Re: Message

• Re: Your picture

• Re: Here is the document

• Re: Your document

• Re: Thanks!

• Re: Re: Thanks!

• Re: Re: Document

• Re: Document

 

Body: (One of the following)

• Your file is attached.

• Please read the attached file.

• Please have a look at the attached file.

• See the attached file for details.

• Here is the file.

• Your document is attached.

 

 

Attachment: (One of the following)

• your_website.pif

• your_product.pif

• your_letter.pif

• your_archive.pif

• your_text.pif

• your_bill.pif

• your_details.pif

• document_word.pif

• document_excel.pif

• my_details.pif

• all_document.pif

• application.pif

• mp3music.pif

• yours.pif

• document_4351.pif

• your_file.pif

• message_details.pif

• your_picture.pif

• document_full.pif

• message_part2.pif

• document.pif

• your_document.pif

13. The worm avoids sending email to addresses containing following strings:

• skynet

• messagelabs

• abuse

• fbi

• orton

• f-pro

• aspersky

• cafee

• orman

• itdefender

• f-secur

• avp

• spam

• ymantec

• antivi

• icrosoft

 

 

-Additional Information:

• Turn off and remove unneeded services. By default, many operating

systems install auxiliary services that are not critical, such as an FTP

server, telnet, and a Web server. These services are avenues of attack.

If they are removed, blended threats have less avenues of attack and you

have fewer services to maintain through patch updates.

• If a blended threat exploits one or more network services, disable, or

block access to, those services until a patch is applied.

• Always keep your patch levels up-to-date, especially on computers that

host public services and are accessible through the firewall, such as

HTTP, FTP, mail, and DNS services.

• Enforce a password policy. Complex passwords make it difficult to

crack password files on compromised computers. This helps to prevent or

limit damage when a computer is compromised.

• Configure your email server to block or remove email that contains

file attachments that are commonly used to spread viruses, such as .vbs,

.bat, .exe, .pif and .scr files.

• Isolate infected computers quickly to prevent further compromising

your organization. Perform a forensic analysis and restore the computers

using trusted media.

• Train employees not to open attachments unless they are expecting

them. Also, do not execute software that is downloaded from the Internet

unless it has been scanned for viruses. Simply visiting a compromised

Web site can cause infection if certain browser vulnerabilities are not

patched.

 

 

Please Download And Update The Latest Virus Definitions/Signatures For

Your Anti-Virus Program A.S.A.P!

 

------------------------------------------------------------------

 

Please Forward This Email To Your Friends And Colleagues To Notify Them

Of The Current Outbreak Situation And Help Them Secure Their Computers.

Thank You!

 

To Receive Instant Email Alerts Like This, Please Visit And Sign Up With

Our Group!

 

C.S.A

http://groups.yahoo.com/group/CyberSecurityAlerts

Email: CSA@o2.ie

Link to comment
Tanong lang, puede bang ma peke ang annulment? kunyari lang, for the sake of fix marriage?

Mahirap yan sis....

 

Una pwde kang kasuhan ng Falsification of documents

2ndly, when you do get a nullity of marriage....dapat me Certificate of finality.

3rdly, me kopya pa ang Census at ang municipal hall where you got your marriage licensce.

 

Kaya don't gamble...baka masabit ka...You might regret doing that.

Link to comment

Architect with BTX for Better Routing, Thermals, and Structural Support

 

Overview: the BTX Motherboard Specification

When Ken Olson, chairman and founder of DEC made the above quote in 1977, he had no idea what a mainstay the computer would become. Today, desktop computers are used everywhere, from homes and offices, to libraries and Internet cafes. This widespread adoption of the computer by consumers and corporations has increased demand for a wider variety of applications and form factors for PCs. With this growing demand, desktop developers need a flexible set of building blocks to take advantage of the opportunities that these new usages present.

 

Balanced Technology Extended (BTX) is a new interface specification that provides a common, flexible foundation, based on standards that can be used to build innovative desktop systems. Systems need to incorporate the latest performance technologies, yet still meet increasing thermal, power, structural, acoustic, and electromagnetic compatibility (EMC) requirements. The BTX specification provides new tools and design space (Figure 1) for developers to lay out desktop systems, whether designing small, compact systems or very large, expandable systems. BTX is also optimized for the newest desktop technologies, including PCI Express* and

Serial ATA.

 

http://www.intel.com/update/images/dt10031_g1.gif

 

Balanced Technology Extended

The BTX desktop form factor is the latest specification created to address many of the design challenges facing developers, including balancing size, performance, features, and cost. The specification also helps developers extend the useful life of industry designs across products and over time. BTX also supports the implementation of a variety of innovative and high-performance technologies for desktop platforms.

 

BTX offers many key advantages for developers, including:

 

Low-profile options for motherboard component keep-out. The lower profiles make it easy to integrate options into slim-line or small form-factor systems.

Optimized routing, layout, and thermal advantages with an inline core layout. The new layout offers a condensed system design and optimized airflow path for efficient system cooling. It also helps developers avoid obstructed airflow that must be forced around components, and helps provide adequate cooling to all components. Along with optimized airflow, the use of high-quality fans can allow developers to eliminate one or more fans from the system, which can reduce the acoustics and system size even further.

Scalable board dimensions. Flexibility in board sizes allows developers to use the same components to design a variety of system sizes and configurations. A smaller, more efficient power supply can be used for ultra-small systems. Standard ATX 12V power supplies can be used for tower configurations.

Optimized structural board-support mechanisms and mounting holes. The support features offer mechanical characteristics to support high loads—such as heavy heat sinks—and help keep them from flexing or damaging board components and traces during shipping and handling.

These advantages make the BTX form factor a perfect choice for system designs, not just for today's PCs, but also for future system designs.

 

PC Form Factors

The term "form factor" is used in the computer industry in various ways. It is often used to refer to the overall size and shape of the system. However, it can also refer to the size and shape of the standard components that can be easily procured, but still allow developers to mix and match components to create a large range of system types and sizes. Such standardization lets developers differentiate a product line to fit the many usage models in the PC industry.

 

Most developers are familiar with the ATX and microATX motherboard form factors that are used in the majority of PCs currently in the market. These form factors describe the size of a motherboard, board-component height restriction zones, and mounting holes—elements that interface with the chassis and power supply.

 

For example, a microATX form factor motherboard is a motherboard that complies with the microATX form factor specification. A microATX form factor motherboard can be integrated into a 10 L chassis (microATX-size) or a 30 L chassis (ATX-size). The form factor (motherboard) for a 10 L, 20 L, or 30 L chassis can be the same, while the system configuration for each PC can be different.

 

The BTX specification helps standardize the same common, mechanical interface described above for ATX and microATX. However, the difference is that the BTX specification was designed to encompass a family of board sizes for a range of system sizes. It's like having ATX, microATX, and FlexATX form factors all in one specification, but BTX can span an even wider range of system sizes with a common core board layout.

 

BTX offers greater flexibility than ATX and microATX by supporting not only different board sizes, but also different system heights. There are two heights defined in the BTX specification for developers to use in their designs. The standard height is similar to the height defined in the ATX-family form factor. An additional, lower profile height is defined for use where it is important to reduce the overall size of the system.

 

Summary

The BTX specification offers developers a building-block approach for using components in systems from 6 L in volume up to standard desktop tower sizes. In addition, the BTX specification gives developers the opportunity to improve thermals, acoustics, motherboard routing, and structural support. BTX is also optimized for the newest desktop technologies, including PCI Express and Serial ATA.

 

Developers can now download and review the specification, then begin working with their customers to review system tradeoffs and the new options available with BTX.

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...