Saturday, June 12, 2021

A REVIEW ON CONNIE DABATE’S MURDER CASE: Fitbit One Wearable


The Author

 

ROSITO D. ORQUESTA

MSIT Student at Jose Rizal Memorial State University-Dapitan Campus

OIC-ICT Dean, Eastern Mindanao College of Technology

Internal Vice President, Council of Deans for ICT Education – Region IX

Sergeant, 62nd Philippine Air Force Reserve Group, 6th ARCEN

Assistant Information Officer, The Fraternal Order of Eagles – Maharlika 3

Member, Zeta Phi Omega 1975 International Fraternity



December 23, 2015 Connie Dabate was allegedly shot in the head by her own husband Richard Dabate who was arrested on April 14, 2016 few months after the incident due to the difficulty of proving his innocence of killing the mother of his two sons in their home on Birch View Drive, Ellington. –Yahoo News


Practical Aspects of Cybercrime Investigations and Digital Forensics

 

There are few things to consider before accepting digital evidences to prove someone’s innocence or to prosecute a criminal according to the United Nations Office on Drugs and Crime; (1) Digital Evidence Admissibility where the court examines the legal authorization to conduct searches and seizures of information and communication technology and related data, and the relevance, authenticity, integrity, and reliability of digital evidence in regards to (Antwi-Boasiako & Venter, 2017), (2) Digital Evidence Assessment where courts determine whether the appropriate legal authorization was used to search and seize information and communication technology (ICT) and related data. The types of legal authorization include a search warrant, court order, or subpoena. The legal order required to obtain ICT and ICT-related data varies by jurisdiction and is determined by national laws (see Cybercrime Module 7 on International Cooperation against Cybercrime), (3) Digital Evidence Consideration where courts conduct an assessment to the integrity of digital evidence by examining the digital forensics procedures and tools used to obtain the evidence, the competence and qualifications of the digital forensics experts who acquired, preserved, and analyzed the digital evidence, and (4) Digital Evidence Determination where the authenticity, integrity, and reliability of digital evidence is assessed based on the outcomes of the assessment of the digital forensics process conducted in the previous phase (i.e., the digital evidence consideration phase), such as the use of forensically sound methods and tools to obtain digital evidence and the testimony of expert witnesses and digital forensics analysts to corroborate the authenticity, integrity, and reliability of this evidence (Antwi-Boasiako & Venter, 2017) –you can read more on Cybercrime Module 6 Key Issues: Digital Evidence Admissibility (unodc.org).

 

On the Rules on Electronic Evidence No. 3 of the Senate Electoral Tribunal of the Republic of the Philippines - An electronic document is admissible in evidence if it complies with the rules on admissibility prescribed by the Rules of Court and related laws and is authenticated in the manner prescribed by these Rules (Philippines Patent No. A.M. NO. 01-7-01-SC.- RE: RULES ON ELECTRONIC EVIDENCE, 2001). Depending on how thorough the process has been taken by the judiciary system handling the case, any electronic evidences should be included in court trials.

 

 

 

 

The Murder Case

 

At around 10:05 in the morning of December 2015 at Ellington, Connecticut Richard Dabate contact the authority of a vulgar with homicide incident in his house killing his wife Connie Dabate, mother of his two sons. According to Richard Dabate as reported by the Hartford Courant, he had fought with a burglar until he had been subdued, just before said burglar had chased his wife, Connie Dabate, into the basement where he shot and killed her. He told the police, according to a police report, that the burglar had been a "tall, obese man" wearing "camouflage and a mask" and had sounded like actor Vin Diesel. Dabate said that the incident had occurred at 9 a.m. on December 23, after his wife had returned home from the gym. But the state police investigation says otherwise as reported by the New York Daily News, an analysis of the Dabate home's "alarm system, computers, cellphones, social media postings and Connie Dabate's Fitbit to create a timeline that contradicted Richard Dabate's statements to police." - (Byrd, 2017)

 

The Courant listed the device's timeline, which included two videos being posted to Facebook from Connie Dabate's cell phone at 9:40 and 9:46 a.m. She also posted a message to a friend on the social media platform. At 10:05 a.m., her Fitbit, which monitors personal metrics like heart-rate, sleep time, and the distance a person walks, registered its last bit of data after she had walked within the house a total of 1,217 feet.

 

Fitbit One the one Connie Dabate has been wearing during the incident tracks all the basic metrics, including sleep, steps taken, and distance walked and calories burned, and also tracks the number of floors you climb.

 

Acceptance on the use of Electronic Data as Counter Evidence to the Statement of Richard Dabate

 

In order to allow the Fitbit evidence, Dewey first had to determine whether the evidence from the device is reliable and relevant, and that jurors would be able to understand expert testimony on the subject.To do so, the judge heard testimony from Keith Diaz, a certified exercise physiologist and an assistant professor at Columbia University Medical Center, who testified that he has completed studies on the accuracy of Fitbit devices. Diaz testified that he had completed a study in which he had people walk and jog on a treadmill wearing several Fitbit devices that were counting their steps. At the same time, a camera was aimed at their feet to also count their steps (Knox, 2020).

The study determined that when worn on a person’s hip, as Connie Dabate was wearing her device the day she was murdered, the Fitbit detects movement accurately 98 percent of the time. However, under cross-examination from Dabate’s lawyer, Trent LaLima, Diaz revealed that the rate of error increased when the devices are used in a real world environment and not a controlled study. LaLima brought that up in his arguments to exclude the Fitbit evidence, saying that the error rate during real world use was too high, and was the only one that mattered, as that’s how Connie Dabate was using her device at the time of her death.

 

          A hearing is scheduled for February 2016 on defense efforts to keep the social media and alarm system information out of the trial. Under questioning by Tolland State’s Attorney Matthew Gedansky, Diaz testified that a variety of scientific studies have found that Fitbits, especially the kind found on Connie Dabate’s body when she was killed, accurately report physical activity. “It’s particularly useful and accurate for step counts,” Diaz said. The devices are generally accepted in the scientific community as a way of measuring physical activity, he said (Owens, 2020). Another user states that the Fitbit One has the tendency of counting "steps" while you're asleep and moving your body is prominent (Rettner, 2021).

 

What is working and not in this case

 

          We cannot deny the fact that all systems and application developed are far from perfection, the Fitbit One is not and exception with its deficiency in gathering actual step counts with 98% accuracy and that it becomes 10% more less accurate when use in real world steps not on a simulated environment like treadmill. Still a 90% accuracy along with text messages on the phone and social media account posts and his newly purchased gun are far better than the statement of Richard Dabate about a stocky 6ft 2in masked man with a “Vin Diesel voice” subduing him by a puncture point lock like most Kung-Fu movies portray.

 

Conclusion

 

          With the advancement in technology and the accuracy of computing specially in the latest development in quantum computing with big data and block chain as key players in this fourth industrial revolution, data collected by wearable devices should be included as evidence as long as its related data, the relevance, authenticity, integrity, and reliability of digital evidence are thoroughly evaluated for admission of the material to be presented in the court as per ruling by the United Nations and the national government of any country.

 

References

Antwi-Boasiako, A., & Venter, H. (2017). A Model for Digital Evidence Admissibility Assessment. IFIP International Conference on Digital Forensics (pp. 23-38). IFIP Advances in Information and Communication Technology, vol 511.: Springer, Cham.

Byrd, N. (2017). Richard Dabate Murders Wife, Blames Burglar, But Fitbit Tracker Proves Husband Lied, Police Say. www.inquisitr.com.

Connor, T. (2017). Fitbit Murder Case: Richard Dabate Pleads Not Guilty in Wife's Death. United States: NBC news.

Knox, M. P. (2020). Judge: Fitbit evidence to remain part of Dabate case. Connecticut: Journal Inquirer. Retrieved from www.journalinquirer.com: https://www.journalinquirer.com/crime_and_courts/judge-fitbit-evidence-to-remain-part-of-dabate-case/article_29722fd0-41dc-11ea-9d17-f7e57dd3bc7b.html

Owens, D. (2020). Judge allows Fitbit evidence into Richard Dabate murder trial, denies request to move trial or bar Ellington residents from jury. Connecticut: HARTFORD COURANT.

Rettner, R. (2021, June 10). Fitbit One: Fitness Tracker Review. Retrieved from www.livescience.com: https://www.livescience.com/43781-fitbit-one-fitness-tracker-review.html

Tribunal, S. E. (2001). Philippines Patent No. A.M. NO. 01-7-01-SC.- RE: RULES ON ELECTRONIC EVIDENCE.

UNODC. (2020, June 10). Module 6: Practical Aspects of Cybercrime Investigations and Digital Forensics. Retrieved from www.unodc.org: https://www.unodc.org/e4j/en/cybercrime/module-6/key-issues/digital-evidence-admissibility.html

 

 


Monday, December 16, 2019

How to Formulate Research Problem

Most students taking thesis/dissertation/research usually takes their concern from what they have observed rather than what was the real cause of it. These mistakes often make the paper loses its value from the scientific community. These mistakes often create temporary remedy rather than a long-lasting solution.

A good example is when you smell stinky garbage, most people would say:
"The cause is the garbage"
"The cause is the people throwing their garbage improperly"
"The cause is the garbage truck not collecting the trash"

That is maybe right but have you questioned your self this?
"Why did people just throw their garbages here? or anywhere?"
"Why did the garbage truck not able to collect this garbages?"

Those questions can even create more questions
"What did the local government does with waste collection management?"
"Are the people here knows ho to segregate?"
"Is there any law about throwing garbage in this city?"

By simply creating a solution for these primary causes identified will not solve the problem.
"The cause is the garbage"
"The cause is the people throwing their garbage improperly"
"The cause is the garbage truck not collecting the trash"

But maybe if you develop a strategy or solution for these questions
"What did the local government does with waste collection management?"
"Are the people here knows ho to segregate?"
"Is there any law about throwing garbage in this city?"

By converting them into these questions
"What can I do to help the local government with their waste collection management?"
"What could I do to inform the people living in this city about the harmful effects of not properly disposing of their garbage and or segregating them correctly?"

"How can I strengthen the law of this city with regards to the clean and safe environment?"

This can also be done using an inverted tree as Problem Analysis tool to formulate your research problem.

In an Inverted Tree, the upper part represent the Cause while the lower part represent the Effect

Example:



This is Problem Tree #1 which the root problem in color green anchored to the Sustainable Development Goals of the (United Nations Development Plan) UNDP #6 or the Clean Water and Sanitation. Out of this problem tree, we are going to take the cause Waste Collection Mismanagement, the one with a red mark and create another problem tree analysis for that.

Note: Your first problem tree analysis should be based on facts and observation.


This is your Problem Tree #2 which uses the marked box in PT #1 as the root problem. You can now select at least one box from PT #2 and create a solution for that identified problem or root cause. Selection of a problem is not limited in the upper part, you may also find a solution on the identified effects in the lower part for this will also solve the main root problem in the PT #1 analysis. In this case we have selected Ineffective Planning Matrix on Waste Collection as our main problem to solve in our research.

Note: In your PT #2 you can now apply your guess and hypothesis about how the root problem occur.



Saturday, December 14, 2019

How to Write a Research Problem

A research paper could not stand alone without the research problem. A research problem is the question/s you want to answer in your research study. In writing the research problem you have to identify your research objectives.

The general objectives or the main objective of your research problem will be the final outcome of your research while the specific objectives are the objectives taken from the general objectives. These specific objectives will answer the question how will you be able to produce the main objective of the study, in these specific objectives, you will formulate your research questions.

In writing your research problem, you may begin with writing a few introductory sentences or a paragraph in relation to your Introduction before putting the main question on your research.

There are different ways of putting your research problems or objectives:

Hypothesis

Example
  1. Automating the garbage bin to identify the biodegradable  and non-biodegradable will decrease the waste management problems.
Research Question

Example
  1. How to solve the waste management problem?
Example of a Research Problem




How to write a Thesis Introduction

In scientific community, a research paper is the way how people communicate with each other, sharing ideas and useful information throughout the history of humankind. This method of communication is the most common yet long lasting form of trade for centuries which keeps the knowledge and technology to advance further.

A good research paper may starts with a title but it is the less of concern in writing your manuscript. When you have done with your theory and conceptualization, a good introduction will let your findings into the mind of the readers, it must open a portal to a new knowledge with interest from the readers. These are pointers in writing a Good Thesis Introduction

Set your audience

Before you write your introduction, do not forget to identify your readers, who might they be, what are their level of educational attainment perhaps. Failure to capture your readers or include the type of readers you may have will ruin your introduction or your whole research paper. A strong point will catch the attention of your readers but without exaggeration. Be formal on your words and the keep an active voice in the introduction. This will makes it more interesting and gives your readers the idea that you are really determine to prove something in your research paper. You have to catch their attention not half but full.
          
State your subject matter

Do not blind your readers to what is what, keep them connected to your research, give them pointers on your research topic, hook their interest on your subject matter. Be clear on your thoughts and meanings and the purpose of your research paper.

Review relevant background

Related literature may be found on your Chapter II but it is a good practice to include relevant topics and research findings in your introduction to make it more realistic. Most readers in the scientific community will look on where you have gotten your points, your ideas regarding on the problems identified in your research. This will also prove how reliable your research paper compare to other research out there.

Connect your introduction to your Research Problem

Lastly, do not let the fire burnt out, always make sure that your readers will continue to read your problem statement. Create a strong connection between your Introduction and Research Problem. Like movies you have to create a cliff hanger.

Tuesday, December 3, 2019

Visual Basic .net Simple Standard Calculator

Step 1: Create New Project with Visual Studio (I am using 2008)
Step 2: Select Windows on Project Types
Step 3: Select Windows Forms Application as Templates
Step 4: Design your simple calculator

Note: The display used is a Label and it has two labels the lower and the upper part namely
        Upper Part:  Secondary Display
        Lower Part: Primary Display

Step 5: Double click on your form and add this codes


Step 6: Add codes to each buttons afterwards

MC

memory = 0
MemoryIndicator.Visible = False

MR

PrimaryDisplay.Text = memory
MemoryIndicator.Visible = True

MS

memory = PrimaryDisplay.Text
MemoryIndicator.Visible = True

M+

memory += CDbl(PrimaryDisplay.Text)
MemoryIndicator.Visible = True

M-

memory -= CDbl(PrimaryDisplay.Text)
MemoryIndicator.Visible = True

<-- (Backspace)

If Len(PrimaryDisplay.Text) > 0 Then
       PrimaryDisplay.Text = Mid(PrimaryDisplay.Text, 1, Len(PrimaryDisplay.Text) - 1)
End If

CE (Clear Equation)

n2 = Nothing
ans = Nothing
operator_active = Nothing
selected_operator = Nothing
SecondaryDisplay.Text = ""

C (Clear)

n1 = Nothing
n2 = Nothing
ans = Nothing
operator_active = Nothing
selected_operator = Nothing
PrimaryDisplay.Text = ""
SecondaryDisplay.Text = ""

+- (Negative Positive)

If Mid(PrimaryDisplay.Text, 1, 1) = "-" Then
            PrimaryDisplay.Text = Mid(PrimaryDisplay.Text, 2, Len(PrimaryDisplay.Text))
Else
            PrimaryDisplay.Text = "-" & PrimaryDisplay.Text
End If

SQRT (Square root)

SecondaryDisplay.Text = "Sqrt(" & PrimaryDisplay.Text & ")"
PrimaryDisplay.Text = CDbl(PrimaryDisplay.Text) ^ 0.5

% (Percentage)

percentage_active = True
SecondaryDisplay.Text = "Percentage(" & selected_operator & ")"

1/x (Reciprocal)

PrimaryDisplay.Text = 1 / CDbl(PrimaryDisplay.Text)
SecondaryDisplay.Text = "(Reciprocal)"

/ (Division)

n1 = CDbl(PrimaryDisplay.Text)
operator_active = True
selected_operator = "/"
SecondaryDisplay.Text = PrimaryDisplay.Text & "/"

* (Multiplication)

n1 = CDbl(PrimaryDisplay.Text)
operator_active = True
selected_operator = "*"
SecondaryDisplay.Text = PrimaryDisplay.Text & "*"

- (Subtraction)

n1 = CDbl(PrimaryDisplay.Text)
operator_active = True
selected_operator = "-"
SecondaryDisplay.Text = PrimaryDisplay.Text & "-"

+ (Addition)

n1 = CDbl(PrimaryDisplay.Text)
operator_active = True
selected_operator = "+"
SecondaryDisplay.Text = PrimaryDisplay.Text & "+"

= (Equal)

n2 = CDbl(PrimaryDisplay.Text)
SecondaryDisplay.Text = SecondaryDisplay.Text & PrimaryDisplay.Text
Select Case selected_operator
       Case "+"
                If percentage_active = False Then
                    ans = n1 + n2
                Else
                    ans = n1 + ((n2 / 100) * n1)
                End If
       Case "-"
                If percentage_active = False Then
                    ans = n1 - n2
                Else
                    ans = n1 - ((n2 / 100) * n1)
                End If
       Case "*"
                If percentage_active = False Then
                    ans = n1 * n2
                Else
                    ans = n1 * ((n2 / 100) * n1)
                End If
       Case "/"
                If percentage_active = False Then
                    ans = n1 / n2
                Else
                    ans = n1 / ((n2 / 100) * n1)
                End If
End Select
PrimaryDisplay.Text = ans
percentage_active = False

Decemal Point

If PrimaryDisplay.Text.Contains(".") = False Then
         PrimaryDisplay.Text = PrimaryDisplay.Text & "."
End If

Number 0 to 9

If operator_active = False Then
            PrimaryDisplay.Text = PrimaryDisplay.Text & "0"
Else
            PrimaryDisplay.Text = "0"
            operator_active = False
End If

Note: Add this codes from number 0 up to number 9 just change the number for each button

Monday, December 2, 2019

Connecting Visual Studio 2008 to MySQL Database using ODBC Connector

Step 1: Install MySQL Database like MySQL Server 5.0
Step 2: Install ODBC Connector like Connector ODBC 5.1
Step 3: Create a project in Visual Studio

Project Type: Visual Basic -> Windows
Project Template: Windows Forms Application


Step 4: Click My Project on your Solution Explorer
Step 5: Click on Reference Tab


Step 6: Click on Add 
Step 7: Click on COM Tab
Step 8: Look for Microsoft ActiveX Data Object 2.7 Library or higher version
Step 9: Click OK

Step 10: On your Project Explorer right click on your project name and mouse over Add
Step 11: Add Module

Step 12: Add the following code on the very top of other code

Imports ADODB

Step 13: Add the following code just below the Module Module 1

Public conn As New ADODB.Connection
Public rs As New Recordset
Public lvi As ListViewItem

Step 14: Add the following code just below Public lvi As ListViewItem

Public Sub Connection()
        On Error GoTo Err
        If conn.State = ObjectStateEnum.adStateOpen Then conn.Close()
            conn.ConnectionString = "Driver=MySQL ODBC 5.1 Driver;Server=Localhost;Port=3306;Database=name_of_my_database;UID=mysqluser;PWD=mysqlpassword;Option=3;"
           conn.ConnectionTimeout = 5
           conn.CursorLocation = CursorLocationEnum.adUseClient
           conn.Open()
           Exit Sub
Err:
        MsgBox(Err.Description, MsgBoxStyle.Information + MsgBoxStyle.Critical)
    End Sub

Note: Driver may depend on the driver you have installed. Server may vary if the mysql database is installed on your machine or to the other computer, if it is the second then use the other computer's IP Address instead of Localhost but be sure you have enabled Allow Remote Connection during the installation of your MySQL Database. Port may also vary if what port number you have used during the installation of MySQL Database, Database name may vary on the created database in your MySQL Database Server, as well as the UID which uses "root" as the default user when you install MySQL and the PWD or password you set up during the MySQL installation while Option = 3 should be kept as is. Lastly there is no restriction on the number of ConnectionTimeout so you decide. THIS IS YOUR CONNECTION SCRIPT TO CONNECT VB.net to MySQL

Step 15: Add the following code after the End Sub of Public Sub Connection()

Public Sub OpenRecord(ByVal sql As String)
        On Error GoTo Err
        If rs.State = ObjectStateEnum.adStateOpen Then rs.Close()
        rs.Open(sql, conn, CursorTypeEnum.adOpenDynamic, LockTypeEnum.adLockOptimistic)
        Exit Sub
Err:
        MsgBox(Err.Description, MsgBoxStyle.Information)
    End Sub

Note: sql comes from your parameter while conn comes from the variable declaration on top.

Step 16: Go back to your design and double click on your form and add this code just below the Public Class Form1

Dim isEdit As Boolean = False

Step 17: On your Form_Load() add the following lines

Connection() 'this will call the connection script
getAllUsers("") 'this will retrieve all previous data from users table.

Note: Be sure you have created a database in your MySQL and should have at least one table like "users" with fields userid int type, username and password text type

Step 17: Double click on your CLEAR button and add this lines inside

TextBox1.Clear()
TextBox2.Clear()
TextBox3.Clear()
getAllUsers("")

Step 18: Go back to your design and double click on your SAVE Button and add this lines

 If Trim(TextBox1.Text) <> "" Or Trim(TextBox2.Text) <> "" Or Trim(TextBox3.Text) <> "" Then
            OpenRecord("Select * from user Where userid = '" & TextBox1.Text & "'")
            With rs
                If isEdit = False Then 'add new record
                    .AddNew()
                    .Fields("userid").Value = TextBox1.Text
                    .Fields("username").Value = TextBox2.Text
                    .Fields("password").Value = TextBox3.Text
                    .Update()
                    MsgBox("New user added.", MsgBoxStyle.Information)
                Else 'edit existing record
                    .Fields("username").Value = TextBox2.Text
                    .Fields("password").Value = TextBox3.Text
                    .Update()
                    MsgBox("Information has been edited.", MsgBoxStyle.Information)
                    TextBox1.Enabled = True
                End If
            End With
        Else
            MsgBox("Incomplete Fields. Please try again.", MsgBoxStyle.Information)
        End If
        Button2_Click(sender, e)
        getAllUsers("")

Step 19: Go back to your design and double click on button EDIT and add this lines

If ListView1.Items.Count = 0 Then Exit Sub
If ListView1.SelectedItems.Count = 0 Then Exit Sub

TextBox1.Text = ListView1.SelectedItems.Item(0).SubItems(0).Text
TextBox2.Text = ListView1.SelectedItems.Item(0).SubItems(1).Text
TextBox3.Text = ListView1.SelectedItems.Item(0).SubItems(2).Text
TextBox1.Enabled = False
 isEdit = True


Step 20: Go back to your design and double click on DELETE button and add this lines

If ListView1.Items.Count = 0 Then Exit Sub
If ListView1.SelectedItems.Count = 0 Then Exit Sub

If MsgBox("This action will delete the selected user. Do want to continue?", MsgBoxStyle.YesNo) = MsgBoxResult.Yes Then

      OpenRecord("Delete from user where userid = '" &   ListView1.SelectedItems.Item(0).SubItems(0).Text & "'")
      getAllUsers("")
      MsgBox("Selected user has been deleted.", MsgBoxStyle.Information)
End If

Step 21: Go back to your design and double click on Textbox for searching and add this lines

Private Sub TextBox4_TextChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles TextBox4.TextChanged
        getAllUsers(TextBox4.Text)
End Sub

Step 22: Add this code at the very end of the script but do not go beyond the "End Class" for your code may not run successfully.

Public Sub getAllUsers(ByVal str As String)
        ListView1.Items.Clear()

        OpenRecord("Select * from user Where username like '" & str & "%'")
        With rs
            While Not .EOF
                lvi = ListView1.Items.Add(.Fields("userid").Value)
                lvi.SubItems.Add(.Fields("username").Value)
                lvi.SubItems.Add(.Fields("password").Value)
                .MoveNext()
            End While
        End With
    End Sub




Sunday, October 20, 2019

Lesson 5 : Detailed Additional Instruction on using WAMP and Wordpress


Step 1: Download and install all x64 bit Microsoft Visual C++ Redistributable from

Link: Microsoft VisualC++ 2008 x64
Link: Microsoft VisualC++ 2010 x64
Link: Microsoft VisualC++ 2012 x64
Link: Microsoft VisualC++ 2013 x64
Link: Microsoft VisualC++ 2015 x64
Link: Microsoft VisualC++ 2017 x64
Link: Microsoft VisualC++ 2019 x64

Step 2: Download and install MySQL Database

Link: MySQL Essential 5.0.51

MySQL Installation with Pictures



Just Click Next



Select Complete and Click Next



Click Install





Click Next



Click Next



Click Finish and if the Configuration Window does not shows up then follow the next step



Click Start Menu, browse to MySQL Folder, then Expand MySQL Server 5.0 and click on MySQL Server Instance Config Wizard



Select Detailed Configuration and Click Next



Select Developer Machine and Click Next



Click Next



Select Manual Setting and set connections to 1400 or maximum value and Click Next



Check Add firewall exception for this post and Click Next



This Error means that there are application that is already listening to Port 3306 for commands, this happens if for example you have installed a WAMP Server first than MySQL. If this happen, just click on Yes and Click Next.



Do not change anything but Click Next



Put Check on Include Bin Directory in Windows PATH and click Next



Note: If you have installed a MySQL Server previously this will happen, it will ask you your current or previous user password for MySQL. If there this non then left the first textbox empty and fill up the next two textboxes with the same password. If you haven’t installed MySQL Server before then the first textbox asking your current user password will no be shown.



Fillup New password and Confirm password then Check Enable root access from remote machines, this will allow a client server application setup where a client computer with the installed program access the MySQL Database installed in the server computer unit. Click Next



If you think you have done all setup right and is ready to execute your command then click Execute.



Note: This error message will be shown when you have entered a WRONG current or previous password if you have installed and configured MySQL Server previously or if you have mistakenly type a wrong confirmation password. Do not worry, just click on Skip and click Back.



If you have successfully supply the correct password then this window will show a configuration file created message. Click Finish.

Step 3: Download and install WAMP Server

Link: wampserver3.1.9_x64


WAMP Installation with Pictures



Click OK



Accept and Click Next



Click Next



Click Next



Click Next



Click Install



Note: If you want to change the default browser for WAMP like instead of using Internet Explorer you want to set it to use Chrome then click on Yes and browse for Chrome Application. Usually the path for Chrome Application is C:\Program Files (x86)\Google\Chrome\Application



Select Chrome and click Open



After selecting or changing the default browser, you will also be ask for a default editor for your code, by default WAMP will use the built-in Notepad of Windows, but if you want to choose for other Text Editor like Notepad++ or Sublime then click on Yes and browse your text editor. Example if you want to use Notepad++, then the default location for the Notepad++ Application will be at C:\Program Files (x86)\Notepad++



Select your text editor (example notepad++) and click Open



Click on Next



Click on Finish and start using your WAMP

Step 4: Download Wordpress

Link: Wordpress 5.2.4

Wordpress Installation with Pictures



Click on Start and open Wampserver64



Click on Wampserver icon tray and click Start All Services to make WAMP Server active



Copy your downloaded wordpress zip or rar file to wamp server www folder C:\wamp64\www



Extract your wordpress zip or rar file






Open Chrome browser or any browser and type localhost on address bar and hit enter.



Add the worpdress folder in your address bar and you will be redirected to installation process for first time use of wordpress http://localhost/wordpress/



By default the language selected is English (United State) so do not change that and click Continue as long as you understand English that any other language.



You will be reminded about setting up your database connection so just click Let’s go! Button to proceed.



Supply all and necessary credentials to connect your website to your database.



If you have entered a wrong value in those fields then this will be the result. Common reasons are

1. You have no database yet named “wordpress”
2. You have entered a wrong user name
3. You have entered a wrong password
4. Unable to locate your connection through Localhost

Common fixes

1. Open your MySQL and create a database named “wordpress”
2. Retype your username correctly, as what you have registered during the configuration of MySQL in previous steps. By default the username for MySQL if not changed is “root”.\
3. Retype your password as what you have registered during the configuration of MySQL in previous steps. By default the password for MySQL is nothing so you can try to left it blank.
4. Instead of using the word or alias “Localhost” try to use “127.0.0.1” instead.



Click on start menu and search for MySQL Command Line, click to execute



Type your MySQL Password, in this case in the previous steps with enter password for MySQL as “1234567”


After typing the correct password and hit Enter key, create a database named “wordpress” and press enter.


Go back to your browser and supply the correct information



if all the information you supplied are correct then click on Run the Installation.



Further setup the following settings for Site Title, Username (different from MySQL) and Password (different from MySQL), email and lect the checkbox unchecked then click on Install Wordpress.



If the installation is correct and without and error then proceed to login.



Supply your username and password as previously setup and click on Login to start building your website.

After setting up your entire website open a new tab in chrome and type http://localhost/wordpress/ and see for yourself the output of your website

SAMPLE OUTPUT













Download PDF File

Activity:

Create your first blogsite and let me see your output offline.



A REVIEW ON CONNIE DABATE’S MURDER CASE: Fitbit One Wearable

T he Author   ROSITO D. ORQUESTA MSIT Student at Jose Rizal Memorial State University-Dapitan Campus OIC-ICT Dean, Eastern Mindanao College ...