Beware of good friends, where no one speaks!

There is a huge scam going on where victims are often middle class to upper class individuals or families, where that one good, if not, the perfect friend ruin your family’s finances. This is a well known scam for years, but it become a very popular tool for many in this hard economic times. What gets me is that most of these criminals are well educated!

Let’s get to the point so that you are aware of the scam before its too late. There are a lots of ways to become a victim of fraud by your close friends. The following example is just one of them:

  • Friend(s) or even a family member(s) become very close to you.
  • They earn your trust using;
      their educational background, specially if you are in South Asian or Chinese community
      by spending money on items to impress you or your family
      by building good friendships with other family members of you
  • Propose a great scheme usually involving stock market shares, real estate or business ventures.
    • your personal assets will be a target
  • Because they already gain your trust, they will ask your to join them/him/her with their scheme where legally you become a partner of the shares, house or company.
  • If it is a house, they will remortgage the house and Continue reading Beware of good friends, where no one speaks!
  • Bullying should be treated as a hate crime

    This is why bullying should be treated as a hate crime NOT as a miscarriage of justice! Bring on the laws… don’t just suspend the bully from school, send their parents to jail! Most of the time it is NOT the kids fault, it is the parent’s fault. If the parent of a bully defend her/his son/daughter, give them a 1 year jail time or $5000 or up charge. Period! H. D. Cartwright Junior High School (Calgary) parents also should STEP down from their bullshit moral high grounds and kick those parents who refuse to take responsibility for their bully kid! Continue reading Bullying should be treated as a hate crime

    RAID explained…

    I did write about my sever structure with a bit of explanation on Redundant Array of Independent Disks (RAID) before. But today I came across an email I sent out to one of my friends explaining how RAID works and what each type of RAID benefit each situation. Today I will post the email as it is and after the final exams, I will rewrite this article to include more specific details.

    RAID(redundant array of independent disks) protection technology is developed to safe guard data in an event of a hardware failure. I found that it is easy to use online info than to type all the explanations. You can read about RAID and watch the following movies to learn the technical information:
    RAID 0(not really RAID) : http://www.youtube.com/watch?v=Uwie0rJSYiE
    RAID 1: http://www.youtube.com/watch?v=-PlS4seeexA&feature=related
    RAID 5: http://www.youtube.com/watch?v=LTq4pGZtzho
    http://www.codinghorror.com/blog/2009/05/beyond-raid.html

    There are few types of RAID and each one has its unique qualities and Continue reading RAID explained…

    Thank you for the suggestions to improve the blog

    Most web developers don’t take suggestions from the public seriously. But I do care about your input to my website and the blog.

    Recently few of my visitors suggested great ways to improve social media integration to promote this blog through comments, “Likes”, emails forwards, etc. As you may have noticed already, I went ahead and added the Facebook module and Share/Bookmark module to my WP blog. The Facebook Like/Send module will only appear when you click on the article link itself.

    Anyway, please keep these great suggestions for improvement coming. I do read all of them and I will implement most of the interesting modules.

    Special thanks goes to visitor named “Treadmill reviews” for Facebook suggestion.

    Side note: This is my first blog post using Blackberry Bold 9900 WordPress Application.

    Adding an IP log code to PHP files

    A lot of people want to keep track of who visit their site. There are several ways to collect user data and the most easiest method would be to collect data using a third party company that logs IPs, page visited and other information such as web browser, data, time, etc. Then then data can be modify to create data on demographics and Internet service providers by extrapolating the IP addresses. However, what is fun of having a third party do your code for you? The fun part comes win when we can make our own code such as the one posted below:

    <!--ip log-->
    <?php
    $v_ip = $_SERVER['REMOTE_ADDR'];
    $v_date = date("l d F H:i:s");
    $v_page = $_SERVER['REQUEST_URI'];
    $u_ref = $_SERVER['HTTP_REFERER'];
    $fp = fopen("sanuja.com-ip_log.php", "a");
    if ($v_ip != "192.168.1.1") {
    fputs($fp, "<strong>IP: $v_ip - </strong><strong>PAGE:</strong> $v_page - <strong>DATE:</strong> $v_date - <strong>REFERER:</strong> $u_refn
    ");
    }
    fclose($fp);
    ?>

    Continue reading Adding an IP log code to PHP files