Pages

Saturday, September 18, 2010

Case#6

CONSUMER ACT OF THE PHILIPPINES
The Republic Act No.7394 is known as the CONSUMER ACT OF THE PHILIPPINES. This act protects and give the rights of the consumer. In the interpretation and implementation of the provisions of this act the best interest of consumer shall be considered. This act is very useful because it develops and provides safety and quality standards for consumer products. It protect the public against unreasonable risks to injury associated with consumer products.

The Act shall be enforced not only by the Department of Health with respect to food, drugs, cosmetics, devices and substances but also by the Department of Agriculture with respect to product related to agriculture, and by the Department of Trade and Industry with respect to other consumer products. Each departments will help to ensure that the product are safe to the consumer. They are responsible in finding or checking if the consumer products are injurious, unsafe and dangerous, including the imported products, and let the consumer to be aware or alert the consumer about this. The concerned departments shall make a list of new consumer product. Any interested person may petition the appropriate department to commence a proceeding for the issuance of an amendment or revocation of a consumer product safety rule or an order declaring a consumer product injurious and unsafe. Any persons who will violate any provisions of this Act will have a penalties depending on its violation.

Friday, September 17, 2010

Case #7

Computer System Security
1.Make a Boot Disk in case of your Computer is Damage or Compromised
To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event.

2.Turn off your PC
Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network.

3. Keep all Applications,including your OS,patched
Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.

Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered you may need to check periodically for updates.

4. Disable Hidden File name Extensions

Disable your hidden filename extension or "Hide file extensions for known file types". The option is enabled by default, but you can disable this option in order to have file extensions displayed by Windows. After disabling this option, there are still some file extensions that, by default, will continue to remain hidden.

5.Use Multiple Back-ups of Critical Data

Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks. Use software backup tools if available, and store the backup disks somewhere away from the computer.

6.Don't Run the Program of unknown Origin

Never run a program unless you know it to be authored by a person or company that you trust. Also, don't send programs of unknown origin to your friends or coworkers simply because they are amusing they might contain a Trojan horse program.

7.Consult Your System Support Personnel if you work from Home
If you use your broadband access to connect to your employer's network via a Virtual Private Network (VPN) or other means, your employer may have policies or procedures relating to the security of your home network. Be sure to consult with your employer's support personnel, as appropriate, before following any of the steps outlined in this document.

8. Adjust you browser settings
to help prevent ad ware from findings its way onto your computer you might also want to adjust your internet browser's secure.For Example On Internet Explorer your Internet Explored Zone Settings should be on "Medium Security" or above

9.Unprotected Window Share
Unprotected Windows networking shares can be exploited by intruders in an automated way to place tools on large numbers of Windows-based computers attached to the Internet because site security on the Internet is interdependent, a compromised computer not only creates problems for the computer's owner, but it is also a threat to other sites on the Internet. The greater immediate risk to the Internet community is the potentially large number of computers attached to the Internet with unprotected Windows networking shares combined with distributed attack tools such as those described in.

10.Disable Java,JavaScript and ActiveX if Possible
Be aware of the risks involved in the use of "mobile code" such as ActiveX, Java, and JavaScript. A malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser.

The most significant impact of this vulnerability can be avoided by disabling all scripting languages. Turning off these options will keep you from being vulnerable to malicious scripts. However, it will limit the interaction you can have with some web sites.