Archive | Internet Basics

Tags: ,

God Number Is Now 20: How Did Google Solve it?

Posted on 17 August 2010 by pinoytutorial

Two long years Rubik’s cube fans have been dazed with the God’s number 22 (as made possible by Tomas Rokicki and John Welborn in August, 2008) and believed that the puzzle has been solved the fastest way that one could—and so they thought.

Every Rubik’s solver uses algorithms in order to solve the mind-spinning cube puzzle. There are algorithms that use sequences that solves the top face of the cube, some use sequences to fix the middle portion, and so on. There are a lot of algorithms that may differ in complexity and the number of moves it requires.

God Himself must have a better, easier and faster algorithm in which to solve the Cube. And this is where the term “God’s algorithm” came from, and the number of moves it would require to solve a really difficult positioning of the puzzle is called “God’s number.”

And yes, thanks to Google’s computers, the newest God’s number is now 20.

For about 35 CPU-years of inactive computer time provided by Google, researchers have eventually solved all the possible positions of the Rubik’s cube, and they proved that each one of these positions could be solved in no less than twenty moves!

But how did they exactly do it?

They divided the positions into 2,217,093,120 sets of 19,508,428,800 each then decreased the count of sets they needed to work out to 55,882,296 utilizing symmetry and set covering. However, they did not find ultimate solutions to each position but instead they found solutions of length 20 or less. Then, they recorded the program that solved one set for about 20 seconds. Ultimately, Google has used 35 CPU years in order to find the solutions to all positions in each of the 55,882,296 sets.

Still sound complicated? Here’s how they did the partitioning part. They broke the trouble down into 2,217,093,120 smaller troubles. Each of these comprised 19,508,428,800 different positions. These smaller troubles were small enough to fit in a modern PC’s memory, and the way Google has broken it down made it possible for them to solve every set faster.

It is said that if you take a mixed up Cube and position it upside down, you will not make it any more difficult—it will still also take the same number of moves to bring to original position again. Instead of trying to find a solution to both of those positions, you can actually solve just one.

Now Rubik patrons could have another God’s number to focus on to. And it’s not 22—but a whopping God’s number 20!

Comments (0)

Tags: , , , , , , ,

Google Nuclear: Let’s Nuke These Basterds!

Posted on 03 April 2010 by pinoytutorial

Just in case you are living on the frigid mountains of the Himalayas or you’ve just got yourself a membership badge from the Tibetan tribe, then we’re sure that you really missed another roll of April fools days pranks, this year – Otherwise you’ll be here, asking again about that Topeka symbol from G’s logo – Which I think is banal, considering the fact that they could’ve come up with several hundreds of unique ideas.

Well, if you’ll ask me, I would rather see this guy, having the cheeks of his (you know 😀 ) on the two big O’s of google, while on a provoking position. Or some funny caricatures of these google-execs inside a prisonguard house blending with Big G’s logo.. while they are waving their hands (I’m sure you got the picture) But sadly, G is too busy on something…

That something is the main topic for tonight, and as a commemoration for the AFD this year, the one we pick, which is somewhat ‘very original‘, came from the Arrington Institute of Crunchers – Pronouncing yesterday, that Google is going all Nuke! And when we say, nuke, we meant this!


Great thing here is, how some people really do believe this article, and somewhat explain their hypo-philosophical thoughts about G going Nuclear. Which I think even made the post, even more nastier.

google nuke

Oh well maybe next year we can see Big G planning to produce an anti-matter, which I think isn’t that far from reality either.

Quick proof: The Google Killer

Geek-Proof: ‘When the Nerd herds collide’

I don’t know about you guys, but I think I’ll prefer the former… No?

Comments (0)

Tags: , , , , , , , ,

Jack Thompson sues Facebook: An extremist story

Posted on 03 October 2009 by pinoytutorial


We heard the story from Mashable and thought upon reading the title “Jack Thompson sues Facebook”, maybe the guy has a solid case. Reading further, we learned that Mr. Thompson was an Ex-lawyer (which also increased our hunch that probably this dude wasn’t a nutcase). WE’RE WRONG.

We read a few articles to discover who Jack Thompson is and good ole Google didn’t fail us.

Who is Jack Thompson?

Jack Thompson served as a lawyer at the state of Florida. He was noted as an Anti-video-game activist especially those having violent and sexual genres. Ex-Atty. Thompson believed that obscenities and violent themes shown in the global media, that includes rap music, computer and video games and TV shows, have harsh effects on children.

Thompson became actively involved on several law suits filed against rap musics, video games such as GTA, Max Payne, Mortal Kombat, Wolfenstein and many others, believing that these were the major cause of violence among the youth.

So what’s the fuss with facebook?

Being the “Dirty Harry” of cyber and media world Thompson gained enemies and protesters. On social-networking site Facebook, Thompson claimed that users made angry postings on his account while others created Anti-Thompson campaigns. The Ex-Attorney felt threatened by these commentaries  and believed that it was Facebook’s shortcomings.

facebook angry man

He explained that Facebook should have “deleted” these mad postings on him. And for not doing so, Ex-Atty. Thompson filled a US$40 million law suit against Facebook at U.S. District Court of Florida. Although it seems, Mr. Thompson’s case is unlikely to have any success because companies like Facebook hold No liability (exempted) for what people do with their services.

Activist or  A nutcase?

angry man 2 Theoretically, what Mr. Thompson believed in was true. As we say, your environment molds you. Today, sex and violence are the main ingredient of video games, T.V. shows , music and the internet. But what can you do about it? Mr. Thompson’s actions made himself look like a “foolish extremist” in front of billions of people who knows what he had done.

You cannot change your environment but you can control and change yourself.

These people commiting acts of violence have done so out of their own will. A normal and intelligent person won’t kill someone out of nowhere. A normal and intelligent kid will not shoot at his classmates and teachers for nothing. It’s very absurd and illogical. Social media is just the tip of the iceberg/ the icing on the cake. The problem with these children are rooted “deeper” like history of child molestation, abusive parents, broken families, history of violence etc.

We cannot think what kind of “world” Mr. Thompson wants to live in. A video game with fairy godmother, fireflies and fairies? How about a rap music of lullabies (peaceful enough)? Or maybe a T.V. series packed with Peter Pan and Cinderella. We’re afraid this guy’s address is at La La land.

The verdict

We weren’t surprise either why Mr. Jack Thompson was “disbarred” from practicing law. This guy is a  certified “conservative” nutcase. If we can give Mr. Thompson an advise, since he cannot stomach things going-on in our society today, it would be better for him to go and live at the mountains.

But on the second thought, isn’t it mountain rangers also have satellite radios with them? So Mr. Thompson probably should settle at the middle of the Pacific ocean together with the peaceful and friendly whales.

Comments (1)

Tags: , , , ,


Posted on 08 September 2009 by pinoytutorial

I felt a strange presence after reading HACKS made in GOOGLE for the past years. I always imagine Google as a Big massive ball of fire and it engulfs you with its flame (look what happened to yahoo?) However, in the back of my mind a doubt is always recurring. Just like some of the millions of citizens in this cyberspace arena. They also would like to know the answer for this simple question.

“What will Google do if its hacked?

So, I did a little research and to my delightment at it revealed a list of the top 6 hacks made to google for this past years.

google hack

So BELIEVE IT OR NOT here they are! (In no particular order)

1. Google’s Click-to-Call project mysterious post

mysterious postIn October 2006, a mysterious post about Google’s Click-to-Call project appeared on the official Google blog. This post says that “Google made a decision to cancel a joint project with eBay because it would be “a monopolistic approach that would damage small companies in the CRM area.” After noticing, Google makes sure that the post was taken down.

Karen Wickre, of the Google Blog team, wrote a response to address the issue in “About that fake post“. Wickre notes that a Blogger “bug,” also known as a security problem, was to blame for enabling the unauthorized post. She reported that the bug was fixed, but did not offer any other details about the breach.

My reply

Doesn’t sound really nasty. Just a “little” post like that? It’s possible that its only a “prank” or an inside job from google employees who is a part of the GOOGLE-CLICK-PROJECT. Anyway, for sure geeks of Google security increase the grade of their lenses to another notch to avoid happening that “mystery” again. Who knows what could have happened if that “blog post” sync to the majority of members of EBAY?

2. Adwords Account Hacked

adwordsIn April 2007 adwords accounts were hacked. Somehow, a malicious file was installed on users’ systems. This file was used to steal the users’ AdWords passwords and gain access to their accounts. The program then set up ads that changed the users’ AdWords campaigns. Most notably, the changes included setting up links that would install a post logger, a type of malware, on the computer of anyone who clicked the link. The malicious program also modified credit card information and prevented the users’ computers from accessing AdWords to see all of the changes on their accounts.

Google responded to the attack by reporting that they had canceled the accounts that were compromised and assured users that they were taking the steps necessary to keep something like this from happening again. Google also encouraged users to keep their computer’s security up to date as the vulnerability was only successful because victims had not incorporated recent patches into their Internet Explorer browsers.

My reply

For some people who still doesn’t know what is adwords. It’s one of the preferred way of companies and other freelance publisher to advertise their websites to drive more traffic. It’s said that having more traffic MEANS more cash.

If Google Adwords is breached, then its highly possible that accounts along with their connected credit card information were also stolen too by this MALWARE. Now the problem is:


I just hope Google checked those innocent accounts first! Before CLOSING it. Not all people who use adwords has big money on their wallets. There should be some sort of compensation given to the victims equaled to what is stolen from them if ever there was. Not cancellation of accounts. What if this hack happened again (I hope not) Will google just automatically close accounts? Doesn’t sound fair right?

3. Oops! Google Deletes itself twice!

deleteIn March 2006, a Digg user claimed that his friend hacked the official Google blog. The “hacker” left a post on a blog at Google’s address. The post explains how he was able to gain access: the Google blog would not come up, so the poster attempted to register the name and it worked. Of course, on Digg, he claims to have figured out the password. These two stories do not correlate, but to determine how they match up would be irrelevant, considering that the post did not constitute a real hack. Jason Goldman, Google’s Blogger Product Manager, posted “And we’re back,” explaining that Google had accidentally deleted their own blog. D’oh! This left it open to be claimed by the poster. He clarifies that the unauthorized post “was not a hack, and nobody guessed [Google’s] password.”

Unfortunately, Google did not learn anything from this experience. In April 2007, a post on the Google Mac blog suggests that it, too, was taken over in the same way. Poster “Vishal” writes, “Yo! This is crazy…I tried to register this and I could!” The post was deleted and things are again back to normal for the Google Mac blog. So far, Google has not acknowledged or offered an explanation for this post, but it seems safe to assume that the Google Mac blog was accidentally deleted, and thus left open to registration by the general public. Again.

My reply

I know its not everyday that Google is  hacked. So once a certain “dude” manage to get inside google’s private area may it be a blog, forums etc. It’s a BIG DEAL! and their egos rise faster than a bazooka. I guess we can’t can’t blame these folks. For what it’s worth, they just HACKED BIG G. I only notice one thing?

Why did the hack REPEAT itself on April 2007?

Did Google paid any attention at all? Maybe, It’s only a simple “hack-a-blog” but for some users, feeling that their accounts are unsafe makes them really ticked!

4. In the Cookie Jar

white hat blackhat

Imagine this: a hacker sets up a Web site with script designed to steal your cookies. Then, they submit this Web site to Digg or Slashdot under the premise that it’s a hot story. Any person who visits that site with active cookies could end up with compromised cookie information, allowing the hacker access to their Gmail, search history, documents and more. It’s a frightening story, and one that could have happened had a white hat hacker not discovered the security hole first.

Tony Ruscoe of Google Blogoscoped discovered a vulnerability in Blogger’s custom domain service. This vulnerability, he noticed, left users open to cookie security problems. He realized that if someone were to enter a Google subdomain as their Blogger custom domain, it would work as long as Google hadn’t already set up a blog at that particular address. Here’s the kicker: using the Google subdomain would allow the owner of the Web site to read and write cookies. Yes, the cookies that hold personal information, including passwords.

Tony set up a “proof of concept” page on a Google subdomain with cookie-stealing JavaScript to test this theory. He then had a friend, Philipp, visit his page. Sure enough, he was able to gain access to a ton of Philipp’s sensitive information, viewing Google Docs & Spreadsheets, subjects and snippets from Gmail, Google search history, Google Accounts, Google Reader, Google Notebook and more. Tony informed Google of the vulnerability.

Google Security quickly wiped out Tony’s proof of concept page and redirected erroneous subdomains to a “blog not found” page. As a result, presumably, Blogger no longer allows any Google domains to be entered in Blogger’s custom domain function. Hopefully Google has thanked this white hat hacker for exposing this vulnerability before it got into the wrong hands and enabled a serious breach of user privacy. The results of this hole could have been catastrophic.

My reply

It’s said, that a WHITE HAT HACKER found this LOOP hole. Try to imagine how many BLACK HAT HACKERS abused this bug before it was discovered? Lucky for us, our gmail account is still here and remained untouched.

Google should not only thank this white hat hacker but should have create an open-source group for white hackers to check loop holes in their systems.

FYI: There are millions of forums today, discussing how to exploit/hack Google. These people are ready not to eat or even sleep just to accomplished their black propagandas. I hope BIG G is paying attention on this one.

5. Gmail Contact List Hijacking


In January 2007, right around New Year’s Day, Googlified discovered a fault in Gmail that allowed a user’s contact list to be stolen via JavaScript. Essentially, users who were logged into Gmail could unwittingly expose their contact list if they visited a particular Web site. This site, theoretically, would contain JavaScript written to exploit the vulnerability. The only way to be protected from this hole was to completely log out of Google services before going anywhere else on the Internet, especially suspicious links sent via email.

Because this vulnerability was exposed with Gmail in beta, Google did not have to report it. However, numerous blogs picked up the story, as well as Digg and Slashdot. Google fixed the problem about 30 hours after being notified. Perhaps security issues like this are the reason why Gmail is still in beta.

My reply: This is one of the reason, why we, of all the people should understand that in online. The term “100% SECURITY” is absurd and a hazy manifestation of what is happening for real.

6. Lots of Hype, No Hack


In May 2005, users who visited Google Search came upon an unexpected surprise: it wasn’t there. To top this disheartening experience off, there were quite a few reports of a website, SoGoSearch, showing up instead. Not surprisingly, the blogosphere reacted, initially reporting that Google’s domain was hijacked. As the story unfolded, it became apparent that Google was not hacked. Rather, they were experiencing problems with their DNS. As for the SoGoSearch Web site, experts explain that browsers redirected to it when they were unable to find SoGoSearch has the domain name

My reply: Imagine that happening again, and the redirection was to another “SOGOSEARCH”, but this time, that SOGOSEARCH is a hacking website that steal information of people who visits that site via their cookies. It’s just a possibility that seems very disturbing if it becomes the reality!

Today, Google is the most preferred way of searching through the internet. Billions of people rely on google’s service. Just a simple “glitch” could lead to an immense catastrophe if Google will be infiltrated by yet another “web-crooks”.

(sources: itsecurity, google)

Comments (2)

Tags: , , , , , , ,


Posted on 31 August 2009 by pinoytutorial

Today, the term “scam” is not a “new tone” for web users anymore. Ironically, when you search a query like “scam” in Google, vast amount of complaints are furiously spread throughout forums, blogs and even social networking sites. It seems countless individuals are still uneducated. What is happening to the world wide web? Aren’t we learning from the same mistakes over and over again?

So we decided to create a new list of scams for 2009. We are hoping that somehow this post can reach the majority and save someone else’s “wallet” when he or she come across with a “web-wolf”

wolf www

Guys, if you think like this way:

I am sure scam will not happen to me, because I am smart, I know everything and I am not fooled easily.

Then be careful, ‘coz you are the typical target of a scammer.  Forget other scam that seems impossible to believe like “You win a lottery ticket!” or the classical “You have a million dollar savings waiting for you”.

These are all new and it’s happening as we speak!

1. Nigerian Scam Remix

Ever received a letter from a stranger. It’s usually the one that is in your “spam/bulk” mail area. Telling you something like this?

nigerian scam 1 nigerian spammer

1st remix: “I am a person who lives in Zimbabwe, who has a father who is a wealthy officer and recently died and I am having problems how can i take care of the money” blah blah, “I am planning to send you the money worth US$21,320,000 hoping you will give your credit card number so we can do the transaction.”

2nd remix: “Permit me to inform you of my desire of going into business relationship with you. I got your contact from the International web site directory. I prayed over it and selected your name among other names” blah blah “My late Mr Boni Amah whom was killed by the rebels that attacked our country cote d’Ivoire west Africa and took over our town (BOUAKE). I ran to Abidjan the economical capital of cote d’ivoire from were I am contacting you” blah blah, My father has a sum of “US$9,000,000(Nine million united states dollars) kept in a private security company here in cote d’ivoire in my name as the next of kin”

“I want you to become a guardian, and hoping we can do the transaction by you giving your credit card account number. Thanks and GodBless”

Common denominator: My friend you have been hitted by an old yet cunning “Nigerian scam”. These type of messages always ask  for your credit card number and personal information so they can use it like their own identity to victimize other people.

How to deal with it:

  • Don’t reply, Delete the message immediately. Try to use email provider coming from,, These email have built-in options to blocked e-mail by id and automatically put this type of messages in your spam box. You can also “filter” these messages if you are still receiving these spams frequently.

2. Dating Networking Scam

I know that many people nowadays are venturing into dating sites aside from, hoping the next site they will found is free of charge! Little  do they  know, the fact that it’s FREE means it’s an eye-candy for scammers too. These crooks will join these dating sites in a form of a “sexy-looking” gal that will try to communicate with you and steal your personal data and use it as a form of identity theft for their next victim.

datingsite date1

Sample: Dear [victim’s name here], I am Alissa and I came across from Georgia. I am still new to this dating site and I am just trying to see what this site has stored for me. I am looking forward to know you more personally, if you will give me a chance.

Common Denominator: They all want to get to know you more personally, and wants your email, your personal account and their “barometer” of trust is you give them your sensitive data like your credit card, home-address, phone number etc.

How to deal with it:

  • If you really like to go deep with complete FREE dating sites, expect these type of messages. You really need to become smart by knowing the person first (through asking with her webcam “on”) Try to see if her smiles and keystrokes are correlated seamlessly and not in a “abnormal pattern”.Otherwise, you could be dealing with a cam-bot. So be wary!
  • Golden Rule: Never give your personal data if you are not actually sure who you are dealing with!
  • And why do you need to give your personal data at a dating site? You should be doing that for real! where you can see the person (and not in a picture from a profile you know only for 5 minutes) This type of defensive-thinking alone will surely save your sanity and help you not fall as another prey for these dating “predators”.

3. Adult social networking site

As of today, millions of people are joining Adult oriented sites. I can’t stressed to you, that you shouldn’t be there on the first place. However, In case you are already “in the club”, you should be more than careful not to give your sensitive information, especially if that “smutty” site is not popular yet (meaning only few had recently joined).

adults adult XXX

Sample: Hi we are from ENK-ENK-ENK  and we are inviting you to join our site to see with our beautiful models who are wanting to meet you personally! As for now, you are only a regular member and you can’t send an email to our models or view them their cam. You need to become a Silver member or a Gold member to enjoy these services. Pay now, through your credit card! (don’t worry we are offering an exclusive 1 dollar a view to make sure it won’t cost you much. This is a once in a lifetime offer other sites don’t give. Join now!)

Common Denominator: They are all eager to see you type your credit card information in that “credit-card form” they provide you. It really doesn’t matter if it’s only 1 dollar a view or the cheapest ADULT SITE IN THE HISTORY of X X X. Once you input your credit card number then you are in for a big trouble my friend.

How to deal with it?

  • When it comes to payment, if their payment form doesn’t have a VERISIGN seal then trash that website. Their credit card form will record your credit card information and use it for purposes like (stealing, bid it to hungry online-black market sites, sell it to another person etc.) So much for the addictiveness to adult networking sites ei?


Tip: Try a Google search and type something like this in the search form “IS a scam?” you will love the results that you will see from fellow users who has already been victim and sharing their melodramatic experience with that adult site!

4. Paypal/Amazon/E-Bay/Citibank Scams

While you are browsing your email address you see about this incredible offer coming from Trusted Sites giving you an offer, and all you need to do is join!

paypal scam

ebay scam

citibank scam

Sample: We are from Citibank and currently you are being handpick as our lucky online member of the day, check this LINK and join our website to automatically join and become our PREMIUM member. And enjoy a 25-50% discount when you buy products using that account. Offer you wouldn’t want to miss!

Common Denominator: They all want you to join in their fake/Phishing website, thus wanting you to give your personal information and credit card account, for them to steal it.

How to deal with it:

  • If you have never been a Citibank/Paypal/Ebay etc. member before, why are they e-mailing you right now?
  • REAL Trusted websites WILL NEVER EVER ask you to join them and gives a some sort of a RAFFLE contest. The Last thing on earth that they will do is to handpick you out of millions of people telling you to join in their website and become a premium member instantly.
  • A way of determining if it’s a scam, is by clicking their link and try to see if the URL is valid or genuine. Try searching that URL on google and see if it’s on the TOP QUERY page also. A Phishing site is noticeable too, if it contains (mispelled, dangling or very-long URLS)

5. PTC site Scam

What is a PTC site? It’s a website that gives you money once you click in a certain advertisment that they give to you. Though, there are some  genuine PTC sites that pays you, the majority are “just hiding in a sheep’s clothing”.


Common Denominator: These PTC site wants you to PURCHASE their “PREMIUM” package (Buy this $500 worth of package and have 300 people clicking for your own network instantly!) After payment, you thought you are given a unique clicking network on your downline. When it’s time for the payout, you will be surprised that their so-called “admin” will say they have send you the money already? Then you wait in vain for months, after that you suddenly heard a news that their website is closing down because of DOS attack, trojan etc. and that’s it! ASTA-LA-VISTA BABY, your money is GONE!

How to deal with it:

  • You must see how old the PTC site, if it’s just new. Wait for some time to see what other users have to say.
  • How frequent is the payout? What is the Minimum payout? If the answer of the website is: every month and the least payout is around $10. You have a good one. Make sure you always withdraw the money and don’t make it reach a hundred dollars. Play safe.
  • Don’t let be fooled by some fake screenshot by other people showing how much they have gain from that PTC site. Majority of these people are exaggerating.

C’mon why boast your money to other PTC users? that will make you look like too-rich and people would not want to click your ads anymore. Make sense, right?

  • So far the only PTC site I see with a VERISIGN is, actually the only PTC site that has celebrated it’s 2nd anniversary.
  • Once you see a PTC site offering packages for buying instant “clicking” network, It’s a SCAM. It just means that the PTC site wants QUICK CASH! A good PTC site, will never play a “BINGO-GAME” out of their member’s affiliated network.
  • Google it out! and search it!

See more details on The top reasons why you shouldn’t invest on PTC sites?

6. Software/ Tool Genie Scam

Ever visited a site and it’s selling a software or a tool that sounds like it can do everything like a GENIE? Usually these type of softwares are cloaked as an “SEO TOOL” (Search Engine Optimization) to help web-publishers boost their RANKS in Google or a traffic-generator that creates near-like-miracles with your website? Well sad to say guys, some of them are SCAMS!

genie question mark

Common Denominator: They don’t offer any trial or guarantee that what you are receiving is the actual thing that they are selling on their advertisement. When you bite their BAIT, your money is gone! and what will you receive? Another software tool, that can only done one of the things these crooks promised their product can do. Worst, sometimes the software has a license and you need to buy for the license to work. Another scam indeed!

How to deal with it:

  • Get a Trial Version of what they are supposed to be selling
  • If it sounds like it can do anything, it means it’s the opposite.
  • Find the name of that software and search about that product, a wise buyer will always do a background check in google to see how many people had bought that product and see what are their reviews about it.

7. Twitter Scams

Twitter has been one of the most “booming” social networking sites today. On this year, Twitter had almost tripled its ranking based on alexa.  Currently, at the top 15 spot (recently dethroned microsoft’s rank). With an ingenious way of sharing your “micro-blogs” in a form of “tweets”, millions of netrepreneurs are starting to harness the power of this “blue-chick”; However, along the success of a networking sites comes the scams. I guess you can never avoid it!

twitter scams

Common Denominator: Just in case you stumble on a website, with a title “How did I earn thousands of dollars using twitter?” or “It’s really easy to earn millions with twitter!” telling you to buy a wonderful seminar he/she made just for you. My dear reader, make sure that you do your “homework” first about that website. Before taking a false-step.

How to deal with it:

  • If the suspect’s site is a blog, try to see how many readers it has obtained. If it’s fewer than your pets in the house. Then it sure is a scam. Seeing the quantity of readers is one of the best “barometer” if a certain website is a swindler or not.
  • See comments from other users, not only inside the advertiser’s blog. But outside as well. Do a quick search about google using queries like “is twitter xxx a scam” or “who bought twitter xxx” etc. Usually, a victim always spurs out from the crowd when being scammed and if you are lucky enough, you will be reading their sad story even before you take your BIG-LEAP!
  • If you think that website is a legitimate site. Try to contact the advertiser and ask some inquiries like (how is the payment done? How will your products be deliverd? Is there a warranty? etc) See if you will receive a reply. A “fakee” who wants to earn quick cash is so busy creating bot accounts and replying with a “human-tone” is quite hard to do for these guys.

In our opinion, there are still a lot of scams out there. Make sure you educate yourself properly. As my mentor always says:

“There’s always a crook born everyday”

crook baby

Comments (13)

Pinoytutorial Links

Or, subscribe to us via email:

Delivered by FeedBurner