Apple iPhone 5 Unveiled

Apple CEO Tim Cook introduced the new iPhone 5 in San Francisco, this Wednesday, September 12, 2012.

I am still planning the buy the Apple iPhone and still in the process of saving money for the purchase of that smartphone, but Apple will be releasing the iPhone 5 already on September 21 in Unites States, Canada, Australia, Germany, France, Britain, Japan, Hong Kong and Singapore (in the Philippines probably by the end of the year). Should I still aim for the old iPhone? I think, I need to change plan, and the money that I saved should be used for this new version of the Apple’s iPhone.


Sascha Segan of PCMag said:

The new anodized aluminum back has a more durable feel and a much softer look to it, and the beveled corners are a little softer in the hand. The volume buttons and lock switch look unchanged, and the SIM slot in the side looks the same, although analyst Michael Gartenberg confirmed on Twitter that the phone uses the new nanoSIM format as opposed to the earlier device’s MicroSIM. The headphone jack has moved to the bottom.

The new iPhone 5 is powered by a dual core A6 chip with a 4-inch “retina” display (touch) screen, and can run on high-speed 4G LTE wireless networks. Besides, it is lighter than the older version of iPhones.

Incoming Visitors

  • sony tito

The PRC Announces the June 2012 Nurse Passers

June 2012 Manila Nurse Licensure Examination Passers

The schedule of the registration of the nurses who passed the June 2012 Nurse Licensure Examination is released by the PRC as shown below at the PRC Auditorium, 5th Floor, Annex Building:


Pampanga Nurse Registration

In Pampanga, the registration of Nurses who passed the June 2012 Licensure Examination will be held on September 22, 2012 (Office Hours) at the Republic Central Colleges, Angeles City, Pampanga.

PRC Regional Offices Nurse Registration

In Regional Offices of the PRC (includes Tacloban City), the registration of Nurses who passed the June 2012 Licensure Examination will held on September 18 to October 3, 2012.

What to Bring?

Nurses who will register are advised to bring the following:

Incoming Visitors

  • Powered by Article Dashboard southern regional college board
  • AnnouncementArchive-SELaplana
  • ww prc gov ph
  • Prc gov ph examination results

Amazon Kindle Fire HD

Amazon introduces the Kindle Fire HD in 2 sizes: Amazon Kindle Fire HD 8.9in and the Amazon Kindle Fire HD 7in.

Kindle HD 8.9”

The Kindle HD 8.9in comes in with exclusive Dolby audio, dual stereo speakers, the fastest Wi-Fi, ultra-fast 4G LTE wireless which is priced at $499. It also has the wifi-only model which is also priced cheaper than the 4G one at $299.

Both the 4G and Wifi-Only 8.9in Kindle Fire HD are powered by 1.5Ghz dual-core processor with Imagination PowerVR 3D graphics core for fast and fluid performance. They both have Dual-band, dual-antenna Wi-Fi for 40% faster downloads and streaming. Other features are the same, except two things:

  1. 4G technology is not installed in the wi-fi only unit
  2. The Wifi-only is available either in 16GB or 32GB storage while the Fire HD 4G is available either in 32GB or 64GB storage.

Kindle Fire HD

Kindle Fire HD which has 7in HD display is smaller and cheaper of course if compared to the 8.9in. It is powered by Dual-core 1.2GHz OMAP4460 and is available either with 16GB or 32GB storage.

Note: As of writing this post, I learned that the Amazon Kindle Fire HD is not yet available in the market. But Amazon is already accepting pre-orders.


Ellicott City August 2012 CSX Corp Train Derailment

Freight train of CSX Corp was derailed early Tuesday (just after midnight), August 22, 2012 (Local Time) while crossing an overpass west of Baltimore. Two (2) 19-year-old women sitting on the ledge of the bridge over Ellicott City were buried and killed by the tons of coal spilled over to them from the train which also crushed nearby cars and damaged telecommunications lines in the area.

The victims are Elizabeth Nass and Rose Mayr who are both residents of the Ellicott City. According to authorities, the two women were sitting on the bridge with their backs on the train which was passing few feet away. While the train was passing them, it was derailed, and the cars filled with coal tipped over dumping the coal over them and buried them.

Authorities are still investigating whether the two victims were just sitting there or they might have been hit by the train. Witnesses, however, said that they heard a braking sound before the colliding metal sounds were heard. Many believed that the derailment was caused by their presence on the rail-bridge.

The three crews of the train who are all alive are still under interview by the authorities.

Photo Update – August 2012 CSX Corp Train Derailment

Disclaimer: Photos shown here are taken from different websites without permission.

Sources: reuters, USAToday,

Incoming Visitors

  • Powered by Article Dashboard train accident

Smart Bro Per Minute Charging


Sir Seplana, I am a Smart Bro user for several years already. I can’t shift to other internet provider because Smart Bro is the only internet access I can use her in our Barangay.

But I have problem with their charging. I thought that when I will be charged 10 pesos per 30 minutes. But it is not what happened. Smart Bro charged me 50 pesos in my 30 minutes use of internet.

After reading your article, I now understand why it happens. Maybe, I was disconnected and then automatically connected for several times in my 30 minutes internet session. And since the 10 pesos per 30 minute charging takes effect only in one straight connection. So, if I was connected for 1 minute and then disconnected  after that, Smart Bro will charge me 10 pesos already.

Is there a way that I can save a little from using smart bro? I understand that UNLISURF is available but, I am not really using internet for long. Thirty minutes a day is enough for me.


Teacher Alex


Teacher Alex,

The per-minute charging of Smart Bro is I think best suit for you. Here’s what you need to do:

  1. First, you need to have a prepaid load credit of more than 10 to make sure you can successfully register or log-in to the smart’s website , . You can opt to register the UNLISurf for 1 day to maximize your time.
  2. If you have not registered into that website, register first here .
  3. Once registered or if you already have registered before, then you can directly login using your email and password here .
  4. Then on your own account, find the PER MINUTE offer link and click on it and then choose the packages you want to avail.

Packages available are:

  1. Php150.00 – 540 minutes for 7 days
  2. PhP100.00 – 300 minutes for 4 days
  3. PhP60.00 – 180 hours for 2 days


Incoming Visitors

  • smartbro charge per minute
  • how to register unli surf smart
  • how to avail unli surf
  • smartbro unli 50
  • Smartbro time charging
  • smart unlisurf cheats
  • smart surf 15 per minute
  • smart bro check no of hours internet
  • how to register to unli surf in smart
  • how to register on smart unli surf promo
  • how to regester in unli surf 15
  • how to connect unlimited surfing
  • smartbro unli surf how to register?

Person Finder for the 2012 Philippine Flooding

Google released a person finder tool to help relatives or friends of those affected by the 2012 Flooding in the Philippines. A user can get information about the missing people and the same time they can share information about the missing people.

You can find emergency contact information, map, and news by Google News and Youtube and infomration from the Project NOAH  (Nationwide Operational Assessment of Hazards):

I embedded the Google Person Finder here.

Western Union Scam?

I was reading the story of a blogger who lost his Adsense income from a thief who claimed it through the Western Union branch here in the Philippines. The story was published at the “In My Solitude” blog.

What happened is that: The particular blogger failed to withdraw her $6,000 Adsense income because someone else has withdrawn it already.

Question: Is it possible that someone other than the suppose recipient can withdraw money at the Western Union?

Answer: Yes! As long as you have the MTCN (Money Transfer Control Number) and any government issued ID bearing the recipient’s name and address including birthday, then you can withdraw the money of someone else.

Question: How could the thief get the MTCN of the money sent by Google through Western Union when in fact it is just sent by Google to its publishers through the Google Adsense website?

Answer: This can be done when your Google account is already compromised. What I mean is that when the thief has gained access to your own Google account, then he can also get your MTCN and your personal information.

Question: Isn’t it any Western Union branches or agents require you to show valid IDs before they give you your money?

Answer: It is true that Western Union requires its branches or any agents to ask valid IDs from the receiver before the release of the money. However, valid IDs can be easily faked or if not, you can get one without hassle, particularly the Postal ID.

I am actually a victim of this but my Adsense income was not stolen from the Western Union but from the Postal office. The Adsense Income was sent to me in check. And I think, the check was stolen in a postal office in Metro Manila since it was cashed in a particular bank in Baclaran. And he couldn’t do it without creating a bank account in my name, because the said check was deposited into a savings account in my name, and creating a bank account needs a valid ID. So, I suspected that the thief has faked an ID bearing my name.

Question: You said that the MTCN can be stolen by accessing my Google account. How can a thief get my Google account login info?

Answer: Thief is using malicious software in doing this job.

For example: If you are using an article submitter program like AMR (Article Marketing Robot), then you are prone to this, because there are article directory websites that infect your PC with a keylogger or with a trojan malware. If your PC is not protected well, then I am sure either a Trojan or Keylogger is spying you, so your logging information in accessing Paypal, Google Adsense and other websites that handle money, are already stolen by the owner of the malware. So, if your Google Adsense income is already stolen, then expect that your money stored in your paypal account will be stolen too in one of these days.

I was once a victim of this too. My Paypal was compromised last year. It just happened that the hacker was coming from outside the Philippines and that Paypal has a system that detects a malicious entry.

I couldn’t say that the hacker was just guessing my password because my password contains characters like @#$%^&* and it couldn’t be read as a word. So, I really thought that the hacker spied me using malware.

From the email of Paypal sent to me, it said that my Paypal account was temporarily suspended because they detected that someone coming from a different location of mine has accessed my account. So, my money stored at my Paypal account was saved.

Question: But according to the article you have linked above, her daughter was using a security feature wherein Google will send her via mobile phone a security code everytime she would access her account. The code should be entered to gain access.

In other words, the thief couldn’t steal the MTCN from her Adsense account because of this feature. So, there should be an inside job from the Western Union.

Answer: I actually don’t know that Google has this security feature. I was not using it anyway. And if this is the case, then it might be true that there is something wrong inside the Western Union.

But a clerk of certain Western Union agent here in my place once told me that they couldn’t get the information regarding the money sent to certain receiver without entering first the MTCN, and that they couldn’t search the Western Union data by simply entering the name of the receiver or the sender.

Would it be possible that the thief was just guessing the MTCN?


Jeff Aspacio, the husband of the victim, commented on this post telling us that the Western Union has investigated the case already and found out that there was really an illegal activity happened.

It is true that the information of the money transfer would be revealed to the teller of any Western Union agents once the MTCN has been inputted, but someone from the Western Union and its agents can access the important list of money transfers.

In other words, this “someone” who has the access to the list and information of the money transfers can be the one who stole the money from the victim.

According to Jeff, the finding of the investigation has prompted the Western Union to send back the money to the sender.

And he also said in a reply to a Facebook communication in a certain group that the Western Union agent involved in this theft is one of the 24-hour establishment in Quezon City. It’s not clear if it’s a pawnshop, rural bank, ticketing office or a bayad center. What is revealed is that the thief is coming from one of the WU agent in Quezon City.

Closing Thoughts

We can’t trust anyone. But at least we should be careful and we should learn how to anticipate the unexpected.

Incoming Visitors

  • ww face com
  • Powered by Article Dashboard money making
  • Powered by Article Dashboard master thieves board game
  • Powered by Article Dashboard check email hoax
  • Powered by Article Dashboard a baseball
  • Powered by Article Dashboard someone
  • Powered by Article Dashboard activity table
  • Powered by Article Dashboard control board
  • Powered by Article Dashboard personal checks
  • Powered by Article Dashboard how much money to save
  • Powered by Article Dashboard board games to play
  • Powered by Article Dashboard money exchange rates
  • Powered by Article Dashboard make money fast and easy
  • Powered by Article Dashboard baseball cards
  • Powered by Article Dashboard damage deposit check list

July 9 is the End of the World … – SELaplana

… created by creators of the DNS Changer virus. So, if your computer is infected by this malware which is invented in Estonia then you might experience the inability to connect to the internet by Monday midnight.

Is it the DNS Changer malware that will disable our internet connection?

No. DNS Changer will not disable your computer from accessing the internet if ever your computer is infected by this malware.

Actually, the court order that FBI got for the operation of the temporary DNS servers that will allow access to the computers that are infected with the said malware is valid till Monday, July 9, 2012 only. So by Monday midnight, FBI will shut down these servers, thus closing the doors of the internet for those computers infected by the DNS changer virus.

Why does FBI needed to set-up temporary servers for internet access of the infected computers?

The FBI discovered the malware called DNS Changer and the rogue DNS servers. The malware and the servers are created and operated by Estonian hackers (read article from FBI) for the purpose of making money online from PPC advertising or an advertising scheme in which advertisers pay the publishers who published the ads in per click basis.

The FBI wanted to shut down these DNS servers. However, they realized that they just couldn’t shut down these servers immediately because there are millions of infected computers that are using them in accessing websites such Facebook, Google, Yahoo and others.

So, as a remedy, they set up clean temporary servers that are backed by a court order which will expire by the midnight this Monday. These servers allow the infected computers to access websites in the internet.

How do the DNS Changer malware and Rogue DNS Servers work for the Estonian Hackers’ interest?

These Estonian hackers operated and controlled various companies that posed as publisher networks from 2007 to 2011. They entered into an agreement with the ad brokers in which they published the ads to the websites of their networks, and they were paid based on the number of clicks that users did to the ads. But for them to earn more from this scheme, they created rogue DNS servers along with the malware called DNS Changer.

The malware was distributed by infecting computers that attempted to download software, visited websites, or watched video online. The malware then changed the DNS server settings of the infected computers by entering the DNS info of the hackers’ rogue DNS servers. Then, this malware performs either of the two jobs:

  1. Advertising Replacement Fraud. When a user visited a website that has ads published on it, the malware with the help of the rogue DNS server replaced the ads with the ads assigned to the publishing networks of these hackers.
  2. Click Hijacking. When the user clicked to a particular link from the search result page of a search engine, the malware will re-route the computer to a different website which is designated by these hackers, instead of being brought to the website that the user wanted to visit.

How do I know whether my computer is clean or not?

If your computer is infected by DNS Changer, you couldn’t user anymore the anti-virus installed in your computer, because it has the capability of blocking the anti-virus software from updating its virus definition files. In other words the anti-virus software installed in your computer could not recognize the DNS Changer as a malware.

You can visit this website,, anyway. It automatically detects your computer whether it is infected or not.

What if my computer is infected, what should I do?

I guess, you already know what to do. You need to clean that up by either using anti-virus software or by reformatting your harddisks.

You said, anti-virus installed in my computer couldn’t recognize DNS Changer as malware, then why recommend anti-virus in cleaning my harddisk?

It is true that the anti-virus installed in your infected computer is useless against the DNS Changer malware. However, there are many ways in which you can use anti-virus software in cleaning your computer from the malware.

For example; you can connect your computer into a local network. Then a clean computer with an updated anti-virus in a network can perform a virus-clean-up operation on the infected PC.

If you can’t repair your PC by yourself then just bring it to the repair shop and let their technicians do the job. You can visit this site too for more info on how to fix your DNSChanger infected computer.


Space X’s Dragon – SELaplana

The Dragon is an unmanned capsule sent by the Space X to the International Space Station carrying 1,146 pounds of cargoes. It is the first space mission carried out by a commercial company that successfully docked at the International Space Station (ISS). It is also the first space flight that completed the task from delivering and unloading cargoes to the International Space Station and then returning back to the earth along with cargoes from the ISS.

About the Dragon

The Dragon is a bell-shaped capsule the resembles the NASA’s Mercury, Gemini and Apollo spacecraft of the 1960s and 1970s. It has a measurement of 4.4 meters high and is 3.66 meters in diameter.

Launching of the Dragon

On May 22, 2012, the SpaceX launched the unmanned rocket, Falcon 9, sending the Dragon capsule into the space.

Docking at the International Space Station

When the Dragon successfully entered the space, it cruised 17,500 miles per hour orbing the earth, and then maneuvered itself so that it will come near the International Space Station wherein the Astronauts in the ISS use the ISS’s robotic arms in grabbing the capsule to dock into the station.

Astronauts from the International Space Station unloaded the 1,146 pounds of cargoes from the Dragon capsule which includes:

  • Food
  • student experiments
  • other materials

Then the Astronauts loaded the Dragon capsule with 1,455 pounds cargoes from the International Space Station which are not already in use that needs to be returned to earth, particularly to the NASA.

The Dragon capsule spent 5 days docking at the International Space Station.

The May 2012 Return to Earth

On Thursday morning, May 31, 2012 at around 8:42 AM Pacific Time, the Dragon capsule safely splashed down the Pacific Ocean.

How it re-entered the earth?

  1. The Dragon capsule is equipped with a heat shield that protects itself from extreme heat upon re-entry of the earth atmosphere.
  2. It also has small rocket engines, the Draco Thrusters, that help the Dragon position itself so that it will touch the earth not on land but on water such us the Pacific Ocean.
  3. It also has the drogue parachutes which are deployed as the Dragon capsule reaches the height of 45,000 feet. These parachutes help in slowing down the speed of Dragon capsule.
  4. The main parachutes which have a diameter of 116 feet are deployed upon reaching the 10,000 feet altitude. These help slowing down the speed of the Dragon capsule so that it will splashed down the ocean safely.

The Dragon is picked by a barge using crane, and it will be transported to Texas so that its cargoes will be handed to the NASA.

The Future of the Dragon

The Dragon capsule will be sent to a display as a historic artefact. However, there are other Dragon capsules that are being prepared for other missions.

The SpaceX is actually planning of upgrading the capsules in a way that it can land into the earth like a helicopter.


Samsung Galaxy S III

Samsung has officially launched its Galaxy S III smartphone on Tuesday, May 29, 2012 in Europe and then on Thursday, it will be launched in India. In the Philippines, Samsung has already launched the Galaxy S3 last Tuesday but it will be available by June 1 with a retail price of PhP33,000.

On Thursday, May 31, 2012,  it was officially in Australia with the suggested retail price of $899.

The Galaxy S3 is powered by the latest Android OS which is the version 4.0 along with the 1.4 GHz Cortex-A9 Exynos 4212 chipset processor.

It has a 4.8-inch HD super AMOLED screen which is bigger than the Galaxy S2. So you can you see the object crisply.

With its “Pop Up Play” feature, you can do two things in one instance like sending SMS or email while watching HD video.

It is equipped with two (2) camera, one in front and another one at the back. Its back camera is an 8.0 megapixel camera with a super-fast shutter. Through its “Burst Shot” feature, it allows you to take 20 continues shots of an event in just one click of the shutter.

The front camera is just 1.9 megapixel camera, but it can even use to record an HD video.