Medifiles E-Record Provider is a company based in Pangasinan that provides the most comprehensive electronic medical record that caters all health specializations. Medifiles’ EMR for clinics is available as a one-time installation package for local area network deployment or as a cloud computing subscription for those who prefer Internet based setup. Major features of their EMR system include comprehensive patient information management, SOAP-based patient treatment module with detailed Objective Observation data entry module and complete charting history viewer, complete ICD 10 and RVU module, patient billing and payments management, PhilHealth E-Claim Submission Service ready and mobile devices compatibility. Visit their website at http://www.medifiles.net .
BNS was engaged by Manila Bulletin to design and deploy a live video stream of the townhall presidential debates. The aim is to provide as wide a coverage as possible to the historic event.
The live stream needed to provide 720P HD video signal to an estimated 40,000 simultaneous viewers. BNS deployed rtmp encoder and rtmp relay servers to achieve this goal.
Presidential Debate Part I https://www.facebook.com/manilabulletin/videos/10154341562722985/
Presidential Debate Part II https://www.facebook.com/manilabulletin/videos/10154341600722985/
Presidential Debate Part III https://www.facebook.com/manilabulletin/videos/10154341694387985/
Presidential Debate Part IV https://www.facebook.com/manilabulletin/videos/10154341754527985/
Presidential Debate Part V https://www.facebook.com/manilabulletin/videos/10154341803362985/
Presidential Debate Part VI https://www.facebook.com/manilabulletin/videos/10154341844752985/
Presidential Debate Part VII https://www.facebook.com/manilabulletin/videos/10154341927297985/
Presidential Debate Part VIII https://www.facebook.com/manilabulletin/videos/10154342000032985/
BNS was tapped by Manila Bulletin, the co organizer of the 3rd Presidential debate that was held at the PHINMA University of Pangasinan.
BNS deployed an open source firewall (Pfsense) with web accelerator (transparent cacheing proxy) to further enhance the speed of the dual links. The two links were made up of the 1gbps fiber link deployed by PLDT and the 500mbps Radio link to BNS via Ligowave antenna systems.
Speedtest.net showed speed around 860mbps when measured by MDICT officials.
Have you ever wondered why your email server is sending you a lot of ‘bounced’ email reports? This might be due to a Hacker attack called “spam injection” on web forms that are poorly written.
First they use “zombies” (PC’s that they have been able to take over) to scan the Internet for web pages containing forms.
Then they try to insert some special code into the fields of your form that will trick your server into sending the form email to a different address, an address that your server is fooled into thinking is specified in a “bcc” field.
To begin they will test your server to see if they can re-route the form to send email to a throwaway email address (usually an AOL address). Once they are successful, they start sending spam emails via YOUR webform. And when those emails bounce, they bounce back to YOUR email server!
Several tips on how to prevent webform spams:
1. Use Captchas.
A CAPTCHA is a visual image (usually of a series of characters) that are written in a strange font and are difficult to read. They are supposed to be impossible for a computer to read, but a human can read them. Then your readers read the text, fill in the correct letters, and their form is submitted.
One way that I like to fool spammers is to add CSS to forms to hide certain fields. When the spam bot comes in and reads the HTML, their bot sees that form field and fills it in. Then when I get the results any entries that have that field are automatically deleted. To do this use the display: none; property on the field. Web browsers will leave that form field completely off the page, but spam bots will see it in the HTML and fill it in.
3. Environment Checks
Every browser sends a HTTP_USER_AGENT value to a server. So a missing HTTP_USER_AGENT value almost always indicates a spammer bot.
The most of browsers (all modern browsers) send a HTTP_REFERER value, which would contain the submitted form URL. Whereas clever bots send this value, a missing HTTP_REFERER value could mean a bot submitting.
Note. There are several firewall and “security” products which block HTTP_REFERER by default. So, none of these people could send a message if you block posting without HTTP_REFERER.
You can use this PHP-code to do the Environment Checks:
4. Extra Form Fields
Yet another way to avoid of spamming by bots is Extra Form-fields where people have to answer an intellectual question like “which day comes after tuesday?” or “spell the number 7 in lowercase letters”. You can take a look at such form at the blog of Kim K. Jonsson.
In order to do not bother people with extra questions, you can invert the Extra Form-fields tactics. Place a blind field with an attractive name into your form. Only bots could detect this fields and fill it out. For example:
Only bots would fill the “email” field, real people will enter emails into the “x” field.
Anders Brownworth suggests to make the Submit button as image and require realistic mouse coordinates with the form posting. Your form processor should then approve the coordinates with etalon. You can take a look at this way realized in the Anders blog.
BNShosting is opening the beta version of our queueing system to the public for testing. The project was led by Mark Gutierrez and by team members from Cagayan State University students.
Please feel free to let us know what improvements can be done to it. Visit this to download the free beta http://www.queue-systems.com/