After all the hard work, it was all worth it. The dissolved oxygen team won the competition in Social Innovation. The Dissolved Oxygen Sensor really attracted the interests of the Judges. They said that this project would give a great impact in the environment.
The team would like to give the credits to our colleagues in Cagayan State University specially Bryan Tapaoan who helped us in making this project possible.
Also, the team want to give thanks to the people who helped them promote the project in social media sites.
Bitstop Network Services Inc. and People’s Television Network, Inc partnered to bring the SONA 2013 online.
Bitstop Network Services Inc is a web hosting company the offering a service like web hosting and web casting.
People’s Television Network, Inc. (PTNI) is a government-owned and controlled corporation established on April 17, 1992 by virtue of Republic Act No. 7306.
The corporate powers of PTNI are exercised by a Board of Directors composed of five members representing three sectors – two from government, two from the private sector and one from the education sector – who are appointed by the President of the Republic of the Philippines.
The Board of Directors, headed by a Chairman, appoints the Network General Manager and Chief Operating Officer who oversees the operations of the station. PTNI has eight (8) line divisions: News, Public Affairs, Sports & Special Projects, Program Production Services, Administrative, Finance, Engineering and Provincial Network.
For direct link of livestreaming visit: http://www.eradioportal.com/ptv4
Early Bird Registration Fee : Php 1, 000.00 per head
Contact: Ms. Carol N. Sanchez and Ms. Mylene M. Saluta
075-5158750 to 54 / 6533247 / 6534388
09175080964 / 09175081163 / 09399396698 /
Participants are expected to bring their own laptop for the event.
Xyon Systems and Services, Inc. would like to introduce you to Evault Endpoint Protection, an all-in-one laptop backup, recovery, and data security solution to control data across your mobile workforce. To get started, simply complete the form below to download any of the resources or to schedule a free consultation.
Have you ever wondered why your email server is sending you a lot of ‘bounced’ email reports? This might be due to a Hacker attack called “spam injection” on web forms that are poorly written.
First they use “zombies” (PC’s that they have been able to take over) to scan the Internet for web pages containing forms.
Then they try to insert some special code into the fields of your form that will trick your server into sending the form email to a different address, an address that your server is fooled into thinking is specified in a “bcc” field.
To begin they will test your server to see if they can re-route the form to send email to a throwaway email address (usually an AOL address). Once they are successful, they start sending spam emails via YOUR webform. And when those emails bounce, they bounce back to YOUR email server!
Several tips on how to prevent webform spams:
1. Use Captchas.
A CAPTCHA is a visual image (usually of a series of characters) that are written in a strange font and are difficult to read. They are supposed to be impossible for a computer to read, but a human can read them. Then your readers read the text, fill in the correct letters, and their form is submitted.
One way that I like to fool spammers is to add CSS to forms to hide certain fields. When the spam bot comes in and reads the HTML, their bot sees that form field and fills it in. Then when I get the results any entries that have that field are automatically deleted. To do this use the display: none; property on the field. Web browsers will leave that form field completely off the page, but spam bots will see it in the HTML and fill it in.
3. Environment Checks
Every browser sends a HTTP_USER_AGENT value to a server. So a missing HTTP_USER_AGENT value almost always indicates a spammer bot.
The most of browsers (all modern browsers) send a HTTP_REFERER value, which would contain the submitted form URL. Whereas clever bots send this value, a missing HTTP_REFERER value could mean a bot submitting.
Note. There are several firewall and “security” products which block HTTP_REFERER by default. So, none of these people could send a message if you block posting without HTTP_REFERER.
You can use this PHP-code to do the Environment Checks:
4. Extra Form Fields
Yet another way to avoid of spamming by bots is Extra Form-fields where people have to answer an intellectual question like “which day comes after tuesday?” or “spell the number 7 in lowercase letters”. You can take a look at such form at the blog of Kim K. Jonsson.
In order to do not bother people with extra questions, you can invert the Extra Form-fields tactics. Place a blind field with an attractive name into your form. Only bots could detect this fields and fill it out. For example:
Only bots would fill the “email” field, real people will enter emails into the “x” field.
Anders Brownworth suggests to make the Submit button as image and require realistic mouse coordinates with the form posting. Your form processor should then approve the coordinates with etalon. You can take a look at this way realized in the Anders blog.