Thursday, March 11, 2010

Windows Patches

Hi Internet Cafe Owner,

We have March 2010 Patches from Microsoft. (see details below)

MS10-016/KB975561 - Important (XP, Vista, 7, Microsoft Producer 2003): Specially crafted Movie Maker files can be used to exploit Microsoft’s Movie Maker and Producer 2003 applications and remotely execute code. This code is executed with the logged in user’s permissions, which makes this less of a security concern. Install this patch during your next regular patch cycle. 1.7MB - 6.1MB

MS10-017/KB980150 - Important (Office XP, Office 2003, Office 2007, Office 2004 for Max, Office 2008 for Mac, Office SharePoint Server 2007, Excel Viewer, Office Compatibility Pack): A number of problems in Excel’s file handling exposed it to remoter code execution attacks with the user’s permissions. Microsoft does not rate this as “critical” but given the prevalence of Excel and the likelihood of users opening Excel files, you will want to install it immediately. 4.9MB - 221.5MB

This Patches only applies to all Genuine Microsoft Product Users.

Monday, March 8, 2010

Counterfeit Intel Core i7 CPUs

Attention Internet Cafe Owner and Offices.I would like to share this report that there are Counterfeited Intel Core i7 Processor. 

According to the Tech Forum Site: It’s not often that a reputable retailer is duped into passing on dodgy goods to customers, but it seems that Newegg managed to end up with counterfeit Intel Core i7 920 CPUs in its supply chain.
HardOCP broke the story:
After talking to several sources on this, it seems that Newegg was in fact selling counterfeit Intel processors.
A fake Intel Core i7-920 was delivered to the hands of HardForum user Vincent Waller in Oregon, AKA “Nix.” He reported his find to other HardForum users Thursday afternoon.
Here’s the latest word from Newegg (via their PR firm DBA Public Relations):
“Newegg is aware of a shipping error that occurred with certain recent orders of the Intel Core i7-920 CPU. After investigating the issue internally it appears one of our long term partners mistakenly shipped a small number of demo boxes instead of functional units. Our customer service team has already begun proactively reaching out to the affected customers. In line with our commitment to ensure total customer satisfaction, we are doing everything in our power to resolve the issue as soon as possible and with the least amount of inconvenience to our customers.”
However, Intel’s Dan Snyder seems to indicate that these aren’t demo boxes but fakes:
“Intel has been made aware of the potential for counterfeit i7 920 packages in the marketplace and is working to how many and/or where they are being sold. The examples we have seen are not Intel products but are counterfeits. Buyers should contact their place of purchase for a replacement and/or should contact their local law enforcement agency if the place of purchase refuses to help.”
I have to say that the demo boxes argument is a weak one. The typos on the box, the genuine-esque label and the fakey manual inside the box seem to rule out this being a demo box in my opinion. Someone’s gone to a lot of trouble to make this seem like a genuine CPU right up until you open the box!

I inserted the Picture of the Counterfeited Processor:






  

Guys be aware of this ha...Sayang ang pera nyo if you go for this...

Saturday, March 6, 2010

Protect your Computer from Viruses!

Guys, i would like to inform you specially the Internet Shop Owner & Business Owners to install anti-virus, update patches etc. 

Here's some tips to protect your computer from viruses.  

Step 1. Buy Original Operating System  (windows)

Step 2. Install it offline (Do Not Connect any Internet Access or Lan Connected to a PC) After Installation, Install the Anti-Virus from CD not from online download. Why? Because while downloading the Anti-Virus. The virus are sneeking inside your desktop system without your knowledge.  

Step 3. Most Important is to Update your Operating System Patches (Tulad ng isang bata na need ng vaccine para sa possible viruses) Online Security Patches are continues sending to all LEGIT operating system 

Step 4. Update your anti-virus patches. 

Step 5. Enable your Firewall.  
Warning: Do not Install P2P Application like kazaa, bearshare, limewire etc.

Step 6. Update your browser (Mozilla or IE) get the latest version 
Step 7. Always clear your cookies and caches


Social Sites like friendster etc are storing infection to your pc so that bago pa masira ang system ng pc mo set-up a protection. Social Site itself is not naman..baka naman matakot kana mag visit sa social sites hehehe :). Yung mismong mga pictures that store inside the social & some running script like java, gif, php etc. are might infected with virus so dapat aware ka dito. Hwag basta basta download ng picture from social sites.

Again, the old school (USB Drive) USB insertion into your pc might also damage the system kaya dapat protected ang pc mo from this "Prostitute USB Flash Disk" hehehe. :) 

Hope this help again guys! Protect your Network Against Malware, Bot Nets & Viruses! Before its too late :)

Internet cafe ban call draws Chinese hacker wrath

Internet cafe ban call draws Chinese hacker wrath

AFP/File – Young Chinese play online games at an internet cafe in Beijing on February 27, 2010. A member of China's …
BEIJING (AFP) – One woman taking part in China's annual parliamentary meetings has learned that law-making has its drawbacks -- especially when you provoke savvy web users.
After Yan Qi, a member of China's legislative advisory body, said she would propose a nationwide ban on private Internet cafes, hackers paralysed the website of her restaurant chain, state media reported Thursday.
Yan, whose business is based in the southwest city of Chongqing, had blamed Internet cafes for social ills ranging from school truancy and petty theft to video game addiction, the Global Times newspaper reported.
"Many serious problems are linked to Internet cafes and businesspeople usually ignore their social responsibilities," Yan was quoted as saying.
"Desperate diseases must have drastic cures, which is to ban them all."
Yan was to propose the ban at the annual gathering of the Chinese People's Political Consultative Conference (CPPCC), which began Wednesday, suggesting that state-run cybercafes should be set up.
Chinese hackers vented their anger by repeatedly hacking into the website of her restaurant chain, Taoranju, changing the home page and removing links.

Internet cafe ban call draws Chinese hacker wrath 


An employee told the newspaper the website had "become a target for everyone" and despite repeated attempts to repair it, the attacks were expected to continue until the controversy dies down.
The restaurateur is one of 2,374 hand-picked members of the CPPCC that includes athletes, billionaires, film stars and farmers. Former Olympic champion hurdler Liu Xiang and director Zhang Yimou are among the delegates.
The body has no real legislative power, but in theory advises China's rubber-stamp parliament, the National People?s Congress.
China is home to the world's largest web population, with 384 million people online. The country has more than 81,000 Internet cafes with 4.7 million computers.

Thursday, March 4, 2010

How cybercriminals invade social networks, companies

SAN FRANCISCO — "Hey Alice, look at the pics I took of us last weekend at the picnic. Bob"
That Facebook message, sent last fall between co-workers at a large U.S. financial firm, rang true enough. Alice had, in fact, attended a picnic with Bob, who mentioned the outing on his Facebook profile page.
So Alice clicked on the accompanying Web link, expecting to see Bob's photos. But the message had come from thieves who had hijacked Bob's Facebook account. And the link carried an infection. With a click of her mouse, Alice let the attackers usurp control of her Facebook account and company laptop. Later, they used Alice's company logon to slip deep inside the financial firm's network, where they roamed for weeks. They had managed to grab control of two servers, and were probing deeper, when they were detected.
Intrusions like this one — investigated by network infrastructure provider Terremark — can expose a company to theft of its most sensitive data. Such attacks illustrate a dramatic shift underway in the Internet underground. Cybercriminals are moving aggressively to take advantage of an unanticipated chink in corporate defenses: the use of social networks in workplace settings. They are taking tricks honed in the spamming world and adapting them to what's driving the growth of social networks: speed and openness of individuals communicating on the Internet.
"Social networks provide a rich repository of information cybercriminals can use to refine their phishing attacks," says Chris Day, Terremark's chief security architect.
This shift is gathering steam, tech security analysts say. One sign: The volume of spam and phishing scams — like the "LOL is this you?" viral messages sweeping through Twitter— more than doubled in the fourth quarter of 2009 compared with the same period in 2008, according to IBM's X-Force security research team. Such "phishing" lures — designed to trick you into clicking on an infectious Web link — are flooding e-mail inboxes, as well as social-network messages and postings, at unprecedented levels.
An infected PC, referred to as a "bot," gets slotted into a network of thousands of other bots. These "botnets" then are directed to execute all forms of cybercrime, from petty scams to cyberespionage. On Tuesday, authorities in Spain announced the breakup of a massive botnet, called Mariposa, comprising more than 12 million infected PCs in 190 countries.
Three Spanish citizens with no prior criminal records were arrested. Panda Security, of Bilbao, Spain, helped track down the alleged ringleader, who authorities say has been spreading infected links for about a year, mainly via Microsoft's free MSN instant messenger service.
"It became too big and too noticeable," says Pedro Bustamante, senior researcher at Panda Security. "They would have been smarter to stay under the radar."
What happened to Bob and Alice, the picnickers at the financial firm, illustrates how social networks help facilitate targeted attacks. As a rule, tech-security firms investigate breaches under non-disclosure agreements. Honoring such a policy, Terremark used pseudonyms for the affected employees in supplying USA TODAY with details of what happened at the financial institution.
Investigators increasingly find large botnets running inside corporate networks, where they can be particularly difficult to root out or disable. "Social networks represent a vehicle to distribute malicious programs in ways that are not easily blocked," says Tom Cross, IBM X-Force Manager.
Koobface gold mine
The attacks run the gamut. In just four weeks earlier this year, one band of low-level cyberthieves, known in security circles as the Kneber gang, pilfered 68,000 account logons from 2,411 companies, including user names and passwords for 3,644 Facebook accounts. Active since late 2008, the Kneber gang has probably cracked into "a much higher number" of companies, says Tim Belcher, CTO of security firm NetWitness, which rooted out one of the gang's storage computers.
"Every network we see today has a significant problem with some form of organized threat," Belcher says. The Kneber gang "happened to focus on collecting as many network-access credentials as possible."
Stolen credentials flow into eBay-like hacking forums where a batch of 1,000 Facebook user name and password pairs, guaranteed valid, sells for $75 to $200, depending on the number of friends tied to the accounts, says Sean-Paul Correll, researcher at Panda Security. From each account, cyberscammers can scoop up e-mail addresses, contact lists, birth dates, hometowns, mothers' maiden names, photos and recent gossip — all useful for targeting specific victims and turning his or her PC into an obedient bot, Correll says.
On the high end, the Koobface worm, initially set loose 19 months ago, continues to increase in sophistication as it spreads through Facebook, Twitter, MySpace and other social networks. At its peak last August, more than 1 million Koobface-infected PCs inside North American companies were taking instructions from criminal controllers to carry out typical botnet criminal activities, says Gunter Ollmann, vice president of research at security firm Damballa.
In another measure of Koobface's ubiquity, Kaspersky Labs estimates that there are 500,000 Koobface-controlled PCs active on the Internet on an average day, 40% of which are in the U.S., 15% in Germany and the rest scattered through 31 other nations. "The personal information employees post day-by-day on Facebook is turning out to be a real gold mine," says Stefan Tanase, a Kaspersky Lab senior researcher.
Facebook, the dominant social network, with 400 million members and therefore the biggest target, says recent partnerships with Microsoft and security firm McAfee to filter malicious programs help keep compromised accounts to a small percentage. "We are constantly working to improve complex systems that quickly detect and block suspicious activity, delete malicious links and help people restore access to their accounts," says spokesman Simon Axten.
Still, social networks have grown popular because they foster open communication among friends and acquaintances, which plays into the bad guys' hands, says Eva Chen, CEO of anti-virus firm Trend Micro.
"These new communication platforms are where people go, so that's where the hackers are going," Chen says.
Meanwhile, discussions about restricting workplace use of social networks and training employees to be more circumspect are just beginning to percolate at venues like the big tech security trade show here this week sponsored by RSA, the security division of EMC. "Most larger businesses simply ask employees to watch their time spent on social-networking sites," Ollmann says.
A noisy attack
Each infected PC in a corporate network represents a potential path to valuable intellectual property, such as customer lists, patents or strategic documents. That's what the attackers who breached Google and 30 other tech, media, defense and financial companies in January were after. Those attacks — referred to in security circles as Operation Aurora — very likely were initiated by faked friendly messages sent to specific senior employees at the targeted companies, says George Kurtz, McAfee's chief technology officer.
The attack on the picnicking co-workers at the financial firm illustrates how targeted attacks work. Last fall, attackers somehow got access to Bob's Facebook account, logged into it, grabbed his contact list of 50 to 60 friends and began manually reviewing messages and postings on his profile page. Noting discussions about a recent picnic, the attackers next sent individual messages, purporting to carry a link to picnic photos, to about a dozen of Bob's closest Facebook friends, including Alice. The link in each message led to a malicious executable file, a small computer program.
Upon clicking on the bad file, Alice unknowingly downloaded a rudimentary keystroke logger, a program designed to save everything she typed at her keyboard and, once an hour, send a text file of her keystrokes to a free Gmail account controlled by the attacker. The keystroke logger was of a type that is widely available for free on the Internet.
The attackers reviewed the hourly keystroke reports from Alice's laptop and took note when she logged into a virtual private network account to access her company's network. With her username and password, the attackers logged on to the financial firm's network and roamed around it for two weeks.
First they ran a program, called a port scan, to map out key network connection points. Next they systematically scanned all of the company's computer servers looking for any that were not current on Windows security patches. Companies often leave servers unpatched, relying on perimeter firewalls to keep intruders at bay. The attackers eventually found a vulnerable server, and breached it, gaining a foothold to go deeper.
A short time later, the attackers were discovered and cut off. One of Bob's Facebook friends mentioned to Bob that the picnic photos he had sent had failed to render. That raised suspicions. A technician took a closer look at daily logs of data traffic on the company's network and spotted the vulnerability scans.
Terremark's Day says two or three collaborators, each with different skill sets, most likely worked together to pull off the attack. "They were noisy about how they went about this," Day says. "Had they been quieter they would've gotten much further."

GUIDE AND TIPS IN SETTING-UP INTERNET CAFE BUSINESS (Philippines)

GUIDE AND TIPS IN SETTING-UP INTERNET CAFE BUSINESS

Tip#1 - Create a Checklist of WHAT TO DO! - Importante ito dahil dapat nakasulat lahat ng kakailanganin mo sa pagpapasimula ng Negosyo. Sa loob ng LIST naka sulat Place Rental, Computer Parts, Area ng Pagtatayuan ng Business, Amount Cost, Advance Budget o Buffer para sa Kuryente at Pagpapaayos ng Lugar na paglalagyan ng Negosyo kung kinakailangan. (Tandaan sa una at dalawang buwan dapat may sobra kang pera upang masagot o mabayaran ang upa (renta) o kuyente bilang paniguro lamang sa overhead cost)

Tip#2
- Humanap ng Mapagkakatiwalaan na bilihan ng parts ng computer - Mag-ikot ka sa mall at sa mga computer shopping area tulad ng Greenhills o sa may Quezon Avenue. Importante na tapat o honest ang mapagbibihilhan nyo ng parts. Mag ask din ng suggestion sa bibilhan kung ano ang tama sa set-up na angkop sa pagtatayuan. Ikokonsider din muna dapat ng shop owner yung lugar na paglalagyan ng mga pc kung ito ay may aircon o wala para makapagdagdag ng cooling fan sa loob ng pc.

Tip#3
- Pagnatapos na ang Set-up ng PC dapat i-Consider ang Electric Bill - dapat pagkatapos rentahan o gamitin ang pc dapat ito ay pinapatay agad. upang hindi kumain ng kuryente.

Tip#4
- Magtipid ng kuryente pag nagpapatch ng game. Hindi tama na ipatch mo ng sabay sabay na nakabukas ang pc at sabay sabay nag dodownload, dapat isa lang pc ang magdodownload pagkatapos ito ang magiging source mo upang hindi kumain ng sobrang kuryente lahat ng pc.

Tip#5
- Dapat may process flow ang negosyo. - Dapat gumawa ka ng process flow sa open office draw upang maintindihan ng bantay mo o ikaw mismo ang proseso ng negosyo mo mula sa pagbukas hanggang mag sara.

Tip#6 - Gumamit ng Software upang mag control ng oras ng gamit ng pc. Like Security Software Cafe Suite, Cyber Cafe Pro o di kaya yung libre na Handy Cafe, Timer (www.handycafe.com) upang hindi mano o manual ang pagtatala ng oras ng shop. Sa ganon malalaman mo din ang oras na konsumo. Ayon sa tala o pag aaral ang 350 to 400 watts ay kumakain ng Php 30.00 sa walong oras. (kasalukuyan rate). reperensya: http://www.meralco.com.ph/ces/ces.jsp

Tip#7
- Bumili ng License Software -  Dapat ang bawat mag invest sa computer ay bumili ng OEM Microsoft License (Windows Vista Business) ang available sa market. Wala ng Windows XP simula nung Feb 1, 2009. Mali na isipin ng bawat investor o magtatayo pa lang ng computer shop na isa-sa lang ang bili ng software. Dapat ito ay kasama sa listahan ng pagsisimula pa lamang. (Php 7,500 ang isang license ng PC / Microsoft OEM OS kasama dapat sa bibilhin bagong pc) and Vista Business ay may bukod na Internet Cafe License Rental Agreement. Siguro magtatanong ka bakit hindi pwede paisa-isa? Dahil ang pera na pinagpaguran mo ay dapat mo proteksyonan...tama ba ako? sapagkat pag dumating nag OPTICAL MEDIA BOARD, PNP and NBI sa internet cafe mo para mag check ng licensing ng pc mo. Tiyak kung isa lang nabili mo. isa lang ang legal. kung meron kang benteng computer tiyak 19 units dadalhin nila at isa nalang ang matitira sayo. May kaso ka pa. Imagine ganon nalang kabilis mawawala ang investment mo. Isama mo na ito sa unang IMPORTANTE sa checklist mo. Huwag makinig sa sabi-sabi ng ibang computer shop. (as per compliance Republic Act No. 8293 and Republic Act No. 9239) visit www.papt.org.ph and www.bsa.com

*tatakbo ba ang lahat ng games sa vista. Ang Microsoft ay nagbigay ng downgrade rights policy sa EULA nila under VISTA Business software. Pwede mo downgrade OS into Windows XP Professional.

Tip#8 - Dapat kumuha ka ng tuitorial o crash course sa Basic Computer Operations - Dapat ang isang shop owner ay marunong gumamit ng computer at huwag i-asa lamang sa technician o magbabantay ng shop. reperensya: http://www.ace-itlearning.com

Tip#9
- Punuin ng Produkto ang Internet Cafe shop mo - tulad ng paglalagay ng AUTOLOAD, ELOAD, SNACKS, CHIPS, CANDIES, SOFTDRINKS at iba pa na alam mo ikokonsumo ng customer mo habang sila ay nagrerent. At kung pwde ay maglagay ng PAYPHONE for local call Php 5.00 per 3 mins at VOIP Phone for international call depende sa lugar na tinawagan ang rate. Usually Php 20.00 per 15 minutes.

Tip#10
- Security Locks - dapat may sapat na lock ang shop mo. Maglagay ng ABLOY padlock (http://www.abloy.com.au/default.asp?id=53)  isa sa matibay na padlock sa market... pero alam nyo ang ginagawa ng mga magnanakaw sa pinagkakapitan ng padlock sila pumuputol kaya dapat magandang klase ang accordion nyo o ang bakal na pinaglalagyan ng padlock na hindi mapuputol at again dapat maganda pagkakamount ng aircondition unit nyo (if may aircon shop nyo) kasi minsan dun na din sila dumadaan.

Tip#11
- Accurate reports sa Income - dapat maglagay ng buwanang Auditor o bookeeper para makita mo kung kumikita ang negosyo o hindi. (Php 1,000~1,500 a month ang bayad sa accountant)

Tip#12 - Mag-isip ng Promo buwan-buwan - dapat naka line-up na lahat ng promo mo buwan buwan. dapat din i-konsider ang mga event sa inyong city o municipality kasi isa ito sa magpapalakas sa negosyo mo. Sumali ka sa mga tarpuline placements ng barangay o kumuha ka ng sponsorship sa iyong lugar kahit mura lang ang babayaran mo basta lilitaw name ng shop mo dun lalo na sa mga malalapit na schools.

Tip#13 - Dapat Ma-alaga sa Computer at paligid. - Araw araw dapat nililinis ang lugar ng shop. Magwalis at mag spray ng air freshener at maglinis sa cpu casing araw araw at sa keyboard. Webcam and mouse. Para ma encourage mo ang mga customer na mag internet o lan game sayo dahil sa malinis ang maayos ang amoy ng shop mo. Ituring mo din na parang restaurant ang shop mo na kapag malinis ang paligid mas marami ang natututwang pumasok at mag rent. Ugaliin din may takip ang mga monitors at cpu at printer pag nag-sara na kayo para iwas moisture din. (if you are not running in 24hours operation)

Tip#14 - Simula palang ng set-up ng mga pc dapat naka patch na lahat ng online games at bumisita sa lahat ng online game company upang magkaroon ka ng posters etc. like www.e-games.com.ph, www.levelupgames.com, etc. yung pagpapatch ay dapat ginagawa pagsetup na ng pc mo sa shop.

Tip#15
- Maghanap ng DSL Provider na aangkop sa operation ng shop mo. Recommended: No.1 BAYANTEL, No.2 GLOBE BROADBAND, No.3 PLDT DSL, No.4 DIGITEL, No.5 SMARTBRO (kung wala ng DSL sa lugar ng set-up mo.) look for better DSL with minimum bandwidth traffic of 1Mbps to 3Mpbs. kung smart bro kukunin mo pwedeng dalawang unit o subscription. basta may isa ka pang traffic server na mag manage ng bandwidth mo o bandwidth manager.

Tip#16 - Maglagay ng tamang anti-virus - tulad ng AVIRA. visit www.download.com

Tip#17
- Magset-up ng Unlimited Ink - para sa printing hindi ka mamulubi sa gastos sa ink. www.unlimitedink.com.ph

Tip#18
- LCD Monitor ang dapat naka bundle sa Computer na ipapaset-up nyo para hindi kayo mamulubi sa kuryente. At menos din sa init ng shop na pinoproduce ng monitor.

Tip#19
- Sumali sa mga Internet Cafe Association. - para maging updated ka sa mga issues and events sa lugar mo. Please join to our Internet Cafe Association, before we start a NEW association or Organization dapat i have atleast 200 members minimum nationwide.
Please click to this link and fill-up the application form if you are interested. After we received your application we will send you confirmation and approval of application.


Tip#20
- Business Plan (1 Year to 5 years) - para sa tamang pagpaplano ng negosyo. Questions to Consider: What you will be 6 months to 5 years from the business started? How much is the total investment? How much is the Monthly Overhead? How many staff i need? What security measure to be inplace? Do i need high multiple internet connections? Ready na ba ako after 1 to years to set-up another branch? Do i need to set timeline? Etc. Etc. Plan to Grow Your Business...Madami kang makikita sa Internet How to Project your business. search to www.google.com

Tip#21 - Gusto mo ba maka-iwas sa VIRUS Problem? - Kung pure internet lang ang access o type ng rental ng shop mo at walang gaming. We recommend the Linux Application para maka iwas sa VIRUS Problems at maintenance ng softwares. visit. www.ubuntu.com

Tip#22
- Iwasan ang mag install ng mga games na download lamang. - Dahilan sa karamihan sa free games sa internet ay naglalaman ng viruses lalo na kung ito ay galing sa torrent o pirated na nakuha mula sa internet. Ito ay magpapabagal ng computer system mo. Kung ano lamang ang sa palagay mo ang hinahanap ng customer yun lamang ang ilagay mo. At huwag mag experiment sa lahat ng pc mo upang hwag masira ang mga ito.

Tip#23
- Mag Lagay ng Camera or Surveillance Camera - Kung nasa kalagayan ka o may budget naman maari mag lagay ng camera hanggang tatlo o apat na unit. Para mabantayan ang negosyo mo. Visit http://www.ecbuyph.com/security-camera.htm o di kaya naman bumili ka nalang ng A4TECH camera na usb 2pcs at 1pc. na USB PCI expansion port na (4ports ready na) then click this link to download recording software.

Tip#24 - No Student in School Uniforms - Iwasan ang magpalaro ng Student sa High School wearing School Uniform from 8am to 5pm. Nationwide ipinagbabawal ang pagpapalaro ng naka uniform. Gawin mo ito bilang self decipline upang hindi ka pag initan ng local government. Bawat lunsod, probinsya o munisipalidad ay may ganitong batas o ordinansya sa pagreregulate ng High School Student in Uniform. click this as classic example: http://www.gmanews.tv/story/51318/Lim-order-Internet-play-for-pupils-banned-during-class-hours

Tip#25
- No Cyber Sex - Hwag pumasok sa isip ng sinuman na magtatayo ng Internet Shop at mag set-up ng Cyber Sex o Pribadong Kwarto upang doon makipag usap ang magrerenta. Alam natin na ang cyber sex ay mahigpit na ipinagbabawal. Malaki nga ang kikitain mo tiyak naman makukulong ka at mawawalan ka pa ng negosyo. Kaya kung may plano ka mag setup tapos gagawa ka ng ilan kwarto para dito...huwag mo na ituloy.

Tip#26 - Set-up Local Server - lahat ng paraan ginagawa ng mga shop owner para dumami ang customer ng ating negosyo di ba. Isang maganda tip ang makapag set-up kayo ng dalawang server na magmamanage ng internet connection nyo tulad ng paglalagay ng Linux Based Web Caching Server at DNS bind9 Server para sa mabilis na pag access ng inyo internet. Na experience nyo na din ba kahit naka 2MB ka pero nag lolog pa rin. lalo kapag madami na gumagamit. Yung ibang shop nga ang ginagawa ay hindi nagpapa surf kapag madami nag online games. Maganda mag setup ng gateway kapag ang shop mo ay higit sa 20 units pataas. tapos isang 2MB pipe lang. this will increase browsing experince up to 50%. At lahat ng patching and update ng games madali lang madodownload from the gateway without the hassle of logs and downtime.

Tip#27
- Speed Up Your Internet Speed Without Taking Much Bandwith. Mga bro ito po ang sekreto ng mga Internet Cafe Owner as i said sa previous Tips ko. Im selling it at Php 30,000 worth of Server that will manage your Bandwidth. You can buy it then down for 50% then the 50% remaining payable within 90days. I also accept demo. Just send YM message to hologramzero@yahoo.com or send email to callcenter@oncallpcsupport for demo schedule. Demo are available within Metro Manila and nearby provinces only. For Cebu and Davao Area. we can arrange the demo. However the client shall agree to provide the following: like transportation (via airplane), food and lodging.

Tip#28
- Honest Technician - Huwag magpapalit palit ng Computer Technician na nag aasikaso ng Internet Cafe mo. Bakit huwag magpalit palit? kasi bawat technician ay may kanya kanyang diskarte sa pagsesetup at pag maintain ng shop. Kung sa palagay mo mas nagagawa nya ang shop mo ang mga computer ng maayos manatili ka na lamang sa iisang technican. Honest ay mahalaga din kundi magbagobago ang piyesa ng computer parts mo. at honest din sa pagsasabi ng technician sa may-ari kung yun ang totoong problema kung ikaw ay nagdududa sa mga computer hardware mo. For Automated Computer Hardware Inventory Service (please contact details below)

Tip#29 - Important Information About Genuine Software - Alam naman natin na tayong mga Pinoy mahilig sa libre lalo na sa hirap ng buhay ngayon at isa pa Hindi lang dahil natatakot tayo kaya ka bumili ng license software. Hindi mo ba alam na mas liliit ang chances ng problema mo sa Operating System pag Genuine ang gamit mo kasi si MICROSOFT ay lagi nag papadala ng mga security patches sa mga legal software na naka online para ma proteksyonan ka sa problema. Personal na experience ko ito nung PIRATED ang gamit ko maya't maya may problema, mabilis bumagal ang pc kaka reformat mo palang pero nung nag legal license na ako nawala ang problema nung nag express update na agad ako sa MICROSOFT website. Tandaan natin na kapag ang software na binili lang natin ng 100 pesos sa bangketa ay totoong THREAT sa negosyo natin tulad ng Internet Cafe at other Business kasi bukod sa takot na mahuli tayo ng ANTI-PIRACY delikado din tayo na mademanda sa ibang bansa dahil sa problema sa MALWARE, BOTNETS etc. Malawak ang problema sa MALWARE at BOTNETS (hacking) wala tayong kamalay malay na nagagamit na ang network natin dahil pirated tayo. Guys, walang binayad ang sinuman sa akin para mag promote ng product o anuman. Gusto ko lang i-share sa inyo ang personal experience sa inyo at tamang gawin ng bawat isa sa atin upang maiwasan ang mga problema maaring lumitaw sa hinaharap.