Battle of the Prepaid Wireless Broadband Provider

Which is Better Globe, Sun, or Smart?



For the past few weeks, I’ve been busy with my offline job as an IT Manager. I’ve been searching for solutions that will improved my company’s remote branches connection to our corporate web portal. That’s why I’ve gathered these top (3) prepaid wireless broadband provider; and I chose prepaid to replaced our very tight dial up internet connection budget.

Read more

New Negosyo Boost from PLDT

DSL Connection, Phone Line, Free Printer and Netbooks for P3,000.00 Only

Last April 15, 2009, the PLDT’s SME Nation lunches their new DSL Package for entrepreneur and business minded – NEGOSYO BOOST.

Negosyo Boost offerings aims to address the key IT challenges of SMEs by going beyond basic infrastructure investments to technology solutions & bundles that are more focused on driving higher revenue price points and efficiency and effectively communicate the business value of technology.


negosyoboost1

Read more

Mikogo Releases Mac Beta Version

The Free Online Meeting Software

Mikogo the free online meeting software for windows are now available for Mac users. With the new release, Mikogo provides an easy-to-use, secure, cross-platform online meeting tool available for use on both Windows® and Mac® computers. And the cost? It’s absolutely free and available for both commercial and private users. Yes I can guarantee that!!!

Read more

How to Remove W32.Downadup.B Virus?

W32.Downadup.B Virus was discovered by Symantec last December 30, 2008, and was announce to public January 9, 2009. Now it widely spreading all over the world and it floodings network connections.

This virus monitors DNS requests to domains containing certain strings and blocks access to those domains so that it will appear that the network request timed out. We (my MIS Team) discovered W32.Downadup.B Virus from our quarantine logs and we found out that it was introduce to the network using a USB drive activated by autorun.inf.


W32.Downadup.B creates an autorun.inf file on all mapped drives so that the threat automatically executes when the drive is accessed. The threat then monitors for drives that are connected to the compromised computer in order to create an autorun.inf file as soon as the drive becomes accessible.

Read more