Monday, October 29, 2012

Do you believe in Karma?


Karma is every moralist’s favorite belief — the idea that whatever you do, good or bad, comes back to you..
kapag ikaw yung TAOng naniniwala sa KARMA ay para kang isang Hinduism na naniniwalang Diyos ang elepante at INC na naniniwalang ang negosyanteng c ginoong Manalo ang huling Propeta..
isang kaibigan ko nagsabi kapag nanloko ka ng babae, babalik ito sa anak mong babae o kapatid na babae..
GENIUS! :D
ibig bang sabihin ang kasalanan ko ay aakuin ng kapatid ko o anak ko? at ako ay nakalibre na? :D
sa pagkakaalam ko ay lahat ng kasalanang ginawa natin dito sa Lupa ay pagdudusahan natin sa Impyerno at hindi pwede aku-in ng kahit na sino..
We live by the choices we make in life both good and bad. The outcome of those choices determine the quality of how we live.
Universe is random and chaotic and human beings are unable to deal with that fact so we construct ideas like KARMA
It is actually play out in our daily lives and make it a way of scaring people into being more kind and thoughtful..
"makakarma ka din" :D
May mga taong naniniwala sa revelation 21:8 (bible) pero naniniwala din nmn sila sa law of karma na isinulat ng isang matalinong pelosopo.. nasan ang kanyang pananampalataya?
ALIEN..

Wednesday, October 3, 2012

Cybercrime Prevention Act of 2012


hindi porke na-implement na itong batas ay bawal na magcomment, magpost at like... 

Mga Shunga laang??? 


kung hindi ka naman kritiko o yung mga bumabanat sa gobyerno.. basta magpost at komento ka laang ng nde mawawala ang iyong moralidad ay wala kang dapat ipag-alala.. 


Basa muna bago magreklamo.. 


****************** 
Republic Act No. 10175 
S. No. 2796 H. No. 5808 
Republic of the Philippines Congress of the Philippines Metro Manila Fifteenth Congress Second Regular Session 
Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand eleven. 
[ Republic Act No. 10175 ] 
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES 
Be it enacted by the Senate and House of Representativesof the Philippines in Congress assembled: 
CHAPTER I PRELIMINARY PROVISIONS 
SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″. 
SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation. 
SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby defined as follows: 
(a) Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network. 
(b) Alteration refers to the modification or change, in form or substance, of an existing computer data or program. 
(c) Communication refers to the transmission of information through ICT media, including voice, video and other forms of data. 
(d) Computer refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet. 
(e) Computer data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online. 
(f) Computer program refers to a set of instructions executed by the computer to achieve intended results. 
(g) Computer system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components which may stand alone or be connected in a network or other similar devices. It also includes computer data storage devices or media. 
(h) Without right refers to either: (i) conduct undertaken without or in excess of authority; or (ii) conduct not covered by established legal defenses, excuses, court orders, justifications,or relevant principles under the law. 
(i) Cyber refers to a computer or a computer network, the electronic medium in which online communication takes place.
(j) Critical infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters. 
(k) Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. 
(l) Database