Linggo, Setyembre 18, 2011

Blog Entry 2 E commerce law of the Phil.

Philippines E-Commerce Law – Republic Act No. 8792

 

(A)Would you be imprisoned if you are found guilty of computer hacking? 
SECTION 33. Penalties. – The following Acts shall be penalized by fine and/or
imprisonment, as follows:
(a) Hacking or cracking which refers to unauthorized access into or interference in a
computer system/server or information and communication system; or any access
in order to corrupt, alter, steal, or destroy using a computer or other similar
information and communication devices, without the knowledge and consent of
the owner of the computer or information and communications system, including
the introduction of computer viruses and the like, resulting in the corruption,
destruction, alteration, theft or loss of electronic data messages or electronic
document shall be punished by a minimum fine of one hundred thousand pesos
(P100,000.00) and a maximum commensurate to the damage incurred and a
mandatory imprisonment of six (6) months to three (3) years;
 
 

 

 

Sabado, Setyembre 17, 2011

blog entry 1

1. What is a professional? A person who is paid to undertake a specialized set of tasks and orchestrate them with uncommon skill. Also when he/ she has acquired the basic skills and knowledge regarding I.T. and has undergone extensive education also, when he is highly competent in his field and is able to apply everything that he has learned; confident enough to address problems with regards to information technology.

Biyernes, Setyembre 16, 2011

The History of Hacking

It all started at MIT’s (Massachusetts Institute of Technology) artificial intelligence lab.The university’s mainframe computers were used by the first hackers. At first, hacker was a name with a positive significance for a person who was good at computers and could push computer programs beyond the normal functioning standard. It was a borrowed name from a term to describe members of a model train group at MIT who hacked the electric trains and switches to make them perform faster, better and differently.

 John Draper was the talk of the 70s because of his ability to make free calls. He built a "blue box" that, when used together with the whistle and phone receiver, phone calls would be made for free. He was arrested on several counts for tampering with the phone lines throughout the 70s. Steve Jobs, Steve Wozniak (founders of apple computer) used this knowledge.

Hacking groups like Legion of Doom in the United States, and Chaos Computer Club in Germany began to emerge. Sherwood Forest and Catch-22 were used by phreaks and hackers to interact, and share stolen passwords and credit card numbers.

Miyerkules, Setyembre 7, 2011

Why do I need to study Computer Ethics?

Ethics deals with placing a value on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not.it is important especially for us I.T. students to let us know the boundaries and for us to know our limitations. because hacking is considered to be theft and as well us its considered to be an invasion of one's privacy.

computer ethics blog: The Effect of Internet in my Life

computer ethics blog: The Effect of Internet in my Life: The Internet changed my life enormously, there is no doubt about that. The internet remains a special tool for
me. An accessable storages ...

Sabado, Setyembre 3, 2011

The Effect of Internet in my Life


The Internet changed my life enormously, there is no doubt about that. The internet remains a special tool for me. An accessable storages of immense knowledge at the stroke of buttons on the keyboard, Internet has a special place in my life. It makes me equipped with knowledge and I think that the internet has so many
educational sites that it can sometimes be easier to set tasks from
there rather than using old text books as they will be outdated.