Jobs Hunting Through Social Networking Sites?
Sunday, September 6, 2009WASHINGTON (AFP) - – Nearly half of US employers research the online profiles of job candidates on social networks such as Facebook, MySpace or LinkedIn, according to a new survey.
Forty-five percent of the employers surveyed for CareerBuilder.com, the largest US online job site, said they use social networking sites to check on job candidates, up from just 22 percent in a survey conducted last year.
Another 11 percent said they plan to start using social networking sites for screening.
"As social networking grows increasingly pervasive, more employers are utilizing these sites to screen potential employees," CareerBuilder said in a statement.
It said job seekers should "be mindful of the information they post online."
CareerBuilder said that of those who conduct online searches as background checks on job candidates, 29 percent use Facebook, 26 percent use LinkedIn and 21 percent use MySpace.
Eleven percent search blogs while seven percent follow candidates on micro-blogging service Twitter.
Thirty-five percent of those surveyed said they have found content on a social network that caused them not to hire a candidate, CareerBuilder said.
Examples included "provocative or inappropriate photographs or information" or content about drinking or using drugs.
Other reasons cited were badmouthing a previous employer, co-workers or clients, poor communication skills, making discriminatory comments, lying about qualifications or sharing confidential information from a previous employer.
Information found on social networking profiles was not always a negative factor in finding a job.
Eighteen percent of employers said they have found content on social networking sites that caused them to hire the candidate, CareerBuilder said.
Some profiles "provided a good feel for the candidates personality" or supported their professional qualifications while others demonstrated creativity or solid communication skills.
Rosemary Haefner, vice president of human resources at CareerBuilder, recommended that candidates "clean up digital dirt" before beginning a job search by removing photos, content and links which could hurt their chances.
The survey of 2,667 hiring managers and human resource professionals was conducted by Harris Interactive between May 22 and June 10. It has a sampling error of plus or minus 1.9 percentage points.
Source: Yahoo News!
Takipsilim (Filipino Version of Twilight)
Sunday, January 4, 2009Honestly, the said project was great, if they supposed to level down their rating and image to the public most especially to the Twilight fanatic.
.....LEAVE TWILIGHT ALONE
....i dOnt Agree tO thiS.i dOnt bElieve thAt they can do mOre better than thE ORginAl Or wOrst tHey will mAke the moviE bAD And not ThAt gOoD.And rayver FOr edward cullen DuH! CompAre him TO RObert pattinsOn...
Those are some of Twilighter's objections and they even got this online petition entitled, Anti-Takipsilim, posted on online petition site. As what being clarified by the said network:
“There is no truth to the Web reports, particularly in the Perez Hilton blogsite, that ABS-CBN is doing a local adaptation of “Twilight”. ABS-CBN will be the first to announce if it is, in fact doing so,” according to ABS-CBN Corporate Communications’ Bong Osorio.
Last week, abs-cbnNEWs.com did a story on an Internet report about the adaptation. The prospect of a local adaptation of “Twilight” has caused a lot of discussion, sometimes heated, on various Internet discussion fora.
How about this post from the ABS-CBN website cached by Google confirming about the said project?
Is ABS-CBN washing their hands like Pontius Pilate? What do you think guys?
Feel free to share it!
Remote Control PC with Hamachi
Thursday, October 16, 2008Hamachi is a centrally-managed zero-configuration virtual private network (VPN) freeware application capable of establishing direct links between computers that are behind NAT firewalls without requiring reconfiguration (in most cases); in other words, it establishes a connection over the Internet that very closely emulates the connection that would exist if the computers were connected over a local area network. Currently available as a production version for Microsoft Windows and, as beta, for Mac OS X and Linux.
How It Works
Hamachi is a centrally-managed VPN system, consisting of the server cluster managed by the vendor of the system and the client software, which is installed on end-user computers.
Client software adds a virtual network interface to a computer, and it is used for intercepting outbound as well as injecting inbound VPN traffic. Outbound traffic sent by the operating system to this interface is delivered to the client software, which encrypts and authenticates it and then sends it to the destination VPN peer over a specially initiated UDP connection. Hamachi currently handles tunneling of IP traffic including broadcasts and multicast. The Windows version also recognizes and tunnels IPX traffic.
Each client establishes and maintains a control connection to the server cluster. When the connection is established, the client goes through a login sequence, followed by the discovery process and state synchronization. The login step authenticates the client to the server and vice versa. The discovery is used to determine the topology of client's Internet connection, specifically to detect the presence of NAT and firewall devices on its route to the Internet. The synchronization step brings a client's view of its private networks in sync with other members of these networks.
When a member of a network goes online or offline, the server instructs other network peers to either establish or tear down tunnels to the former. When establishing tunnels between the peers, Hamachi uses a server-assisted NAT traversal technique, similar to UDP hole punching. Detailed information on how it works has not been made public. The vendor claims "...to successfully mediate P2P connections in roughly 95% of all cases ..." This process does not work on certain combinations of NAT devices, requiring the user to explicitly set up a port forward. Additionally 1.0 series of client software are capable of relaying traffic through vendor-maintained 'relay servers'.
In the event of unexpectedly losing a connection to the server, the client retains all its tunnels and starts actively checking their status. When the server unexpectedly loses client's connection, it informs client's peers about the fact and expects them to also start liveliness checks. This enables Hamachi tunnels to withstand transient network problems on the route between the client and the server as well as short periods of complete server unavailability.
Each Hamachi client is assigned an IP address from the 5.0.0.0/8 address block. This address is assigned when the client logs into the system for the first time, and is henceforth associated with the client's public crypto key. As long as the client retains its key, it can log into the system and use this 5.x.x.x IP address.
The 5.0.0.0/8 network is used to avoid collisions with private IP networks that might already be in use on the client side. Specifically - 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16. The 5.0.0.0/8 address block is reserved by IANA and is not currently in use in the Internet routing domain, but this is not guaranteed to continue. The IANA free pool is expected to be exhausted by February 2011.[1] If this range is allocated, Hamachi users will not be able to connect to any Internet IP addresses within the range as long as the Hamachi client is running.
Additionally, using a /8 network prefix creates a single broadcast domain between all clients. This makes it possible to use LAN protocols that rely on IP broadcasts for discovery and announcement services over Hamachi networks. Hamachi is frequently used for gaming and remote administration. The vendor provides free basic service and extra features for a fee.
About
Thursday, October 9, 2008Hi, my name is wolfwood16. A student of an IT School here in the Philippines. I like computer stuffs preferably blogging, web development, and computer security. These are some of the computer stuffs I am capable of:
- Web Page Designing and Development
- Graphic Designing
- Digital Photography
- Flash and Swish Animation
- PHP Programming
- MySQL Programming
- Visual Basic Programming
- Visual Fox Pro Programming
- JAVA Scripting and Programming
- Knowledge in C/C++ Programming
- Turbo Assembly Programming (TASM)
- CSS Scripting
- XML Programming
- Computer Setup and Troubleshooting
- Network Setup and Troubleshooting
- System and Network Administration and Security
If you wish to contact me regarding my site, feel free reach me with my email at wolfwood16[at]gmail.com.
Feel free to share it!