My experience on my daily works... helping others ease each other

Saturday, October 29, 2011

A good blog to learn something

Take a look at http://drotspss.blogspot.com/

Although the way it is organize and writing seem too 'relax', but the value and knowledge inside it is very useful.
Share:

Energy efficient C code for ARM devices

An interesting articles by Chris Shore which appeared in ARM Tech. Conference. Check it out here

My thought:
I'm more interested on how you improve securities in ARM devices and at the same time maintain or did not causes any harm to the devices efficiencies especially current era where attacks can be directed or coming from a small devices such as wireless sensor.

There will always a debate on security versus performance and you can only have one to choose. However, I would love to see something that be able to work in parallel for both security and performance :)
Share:

Friday, October 28, 2011

Users don't understand public Wi-Fi risks

People accessing public Wi-Fi aware data theft and industrial espionage could happen with unsecured networks but see risks as "theoretical", say Astaro execs.[read more]

My 2 cents
There is nothing new in this. People especially in information security area know about this few years back and become greater concern when many restaurant, shops, etc are providing free WiFi access. It do come back to each individual. Their concern, purpose, and priority - which ones come first.
Share:

XML vulnerability leads to calls for standards change

German scientists say weakness in cipher block chaining mode for XML encryption means secured communications between Web services can now be decrypted, and call for change in encryption standard. [read more]

What do I think?
Current encryption method, or cryptography method is still strong. I believe that they can't simply break those and decrypt XML message. There must be specific scenario or parameters required in order for them to succeed.

Nevertheless, security community can't take that for granted. Hacking tools, methods, and others related to exploiting, cracking, etc are becoming easily accessible and easy to use or implemented. Computing powers is increasing but the cost is decreasing thus enable any decryption, hacking, brute-force kind of attack, etc to be completed faster or to be execute with more power.
Share:

Friday, October 21, 2011

Conference List - As of Oct 22, 2011


  • Finance Transformation for CFOs 24 October 2011 Toronto Canada
  • 2011 ANSYS Belgium Conference 25 October 2011 La Hulpe Belgium
  • 2011 ANSYS Netherlands Conference 28 October 2011 Eindhoven Netherlands
  • SWARM 10 November 2011 Sydney Australia
  • International Conference on Advancements in Information Technology 2011¨CICAIT 2011 17 December 2011 Chennai India
  • 2011 International Conference on Signal, Image Processing and Applications (ICSIA 2011) 17 December 2011 Chennai India
  • 1st International Workshop on Nanoparticles and their Applications in Medicine (NAM-2012) 03 January 2012 Kharagpur India
  • 2012 3rd International Conference on e-Education, e-Business, e-Management and E-Learning (IC4E 2012) 05 January 2012 Hong Kong China
  • International Conference on Intelligent Computational Systems (ICICS'2012) 07 January 2012 Dubai United Arab Emirates
  • 2012 International Conference on Innovation and Information Management(ICIIM 2012) 07 January 2012 Chengdu China
  • SCADA Asia 2012 11 January 2012 Hong Kong Hong Kong
  • 2012 International Conference on Communication and Electronics Information - ICCEI 2012 14 January 2012 Mumbai India
  • Network Enabled Operations Summit 23 January 2012 Washington DC
  • 2012 4th International Conference on Computer modeling and simulation (ICCMS 2012) 17 February 2012 Hong Kong China
  • 2012 International Conference on Information and Computer Applications(ICICA 2012) 17 February 2012 Hong Kong China
  • 2012 International Conference on System Modeling and Optimization(ICSMO 2012) 17 February 2012 Hong Kong China
  • 2012 International Conference on Digital Convergence (ICDC 2012) 18 February 2012 Coimbatore India
  • 2012 International Conference on Information and Computer Networks, ICICN 2012 26 February 2012 Singapore Singapore
  • The Early Education and Technology for Children (EETC) 14 March 2012 Salt Lake City Utah
  • The first International Conference on Informatics & Applications (ICIA2012) 03 June 2012 Kuala Terengganu Malaysia
  • SANS Forensics and Incident Response Summit 2012 21 June 2012 Austin Texas
  • InSITE 2012 22 June 2012 Montreal Canada
  • 3rd International ACM Sigsoft Symposium on Architecting Critical Systems (ISARCS 2012) 26 June 2012 Bertinoro Italy
  • 7th International Conference on Evaluation of Novel Approaches to Software Engineering 28 June 2012 Wroclaw Poland
  • LCBR European Marketing Conference 2012 09 August 2012 Munich Germany
  • Share:

    Codepad

    An online compiler/interpreter, and a simple collaboration tool 
    http://codepad.org/ created by Steven Hazel, one of the founders of Sauce Labs
    Share:

    Wednesday, October 19, 2011

    MyNOG-1 Conference

    A message to all members of ISOC MALAYSIA Chapter

    The MyNOG-1 Programme Committee are now seeking contributions for Presentations and Tutorials for MyNOG-1 that will be held on the 16 January – 17 January 2012 at Cyberjaya, Malaysia.

    We are looking for people and proposals that would:
    - Offer a technical tutorial on an appropriate topic; and/or
    - Participate in the technical conference sessions as a speaker; and/or
    - Convene and chair a Birds of a Feather (BoF) session.

    Please submit proposals online at:
    program@mynog.org

    CONFERENCE MILESTONES
    ———————
    o Call for Papers Opens: 14 October 2011
     o First Deadline for Submissions: 8 November 2011
    o First Draft Programme Published: 22 November 2011
    o Final Deadline for Submissions: 20 December 2011
    o Final Programme Published: 6 January 2012
    o  Final Slides Received: 10 January 2012
    o  Conference starts 16 January 2012
    ———————-

    The MyNOG-1 Programme is organised in two parts, including tutorials and the conference.
    Topics for tutorials and conferences would include amongst others relevant to Internet operations and technologies:
    - IPv4/IPv6 routing and operations.
    - IPv4 address run-out.
    - IPv6 deployments, transition technologies and experiences.
    - Network backbone operations.
    - ISP and network carrier services.
    - Network security issues (NSP-SEC, DDoS, Anti-Spam, Anti-Malware, Anti-Virus, e.t.c.).
    - Peering and Internet exchange points.
    - DNS/DNSSEC.
    - Internet policy (Security, Regulation, Content Management, Addressing, e.t.c.).
    - Access and transport technologies, e.g., xDSL, wireless, MPLS, Ethernet, FTTx, e.t.c.
    - Content and service delivery, e.g., Multicast, VoIP, video, TelePresence, IPTv, gaming, e.t.c.
    - Data Centre and Virtualization technologies.

    CfP SUBMISSION
    ————–
    Draft slides for both tutorial and conference sessions MUST be provided with CfP submissions otherwise the Programme Committee will be unable to review the submission.
    For work in progress, the most current information available at the time of submission is acceptable.
    Final slides are to be provided by the specified deadline for publication on the MyNOG website. While the majority of speaking slots will be filled by the first submission deadline, a limited number of slots may be available up to the final submission deadline for presentations that are exceptionally timely, important, or of critical operational
    importance.

    Please submit online at:
    program@mynog.org

    Any questions or concerns should be addressed to the Programme Committee by e-mail as below:
    program@mynog.org


    We look forward to receiving your presentation proposals.
    MyNOG Management Committee
    Visit ISOC MALAYSIA Chapter at: http://www.isoc.my/?xg_source=msg_mes_network
    Share:

    Tuesday, October 18, 2011

    Oracle Critical Patch Update October 2011

    October 18th, 2011

    The Critical Patch Update for October 2011 was released on October 18th, 2011. Oracle strongly recommends applying the patches as soon as possible. Please note that Sun products are included in this Critical Patch Update.

    The Critical Patch Update Advisory is the starting point for relevant information. It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Supported Products and Components Affected" section of the advisory do not require new patches to be applied.

    Also, it is essential to review the Critical Patch Update supporting documentation referenced in the Advisory before applying patches, as this is where you can find important pertinent information.

    Critical Patch Update Advisories are available at the following location:

    Oracle Technology Network:
    http://www.oracle.com/technetwork/topics/security/alerts-086861.html

    The Critical Patch Update Advisory - October 2011 is available at the following location:

    Oracle Technology Network:
    http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html

    The next four Critical Patch Update expected release dates are:
    • January 17, 2012
    • April 17, 2012
    • July 17,2012
    • October 16, 2012

    Share:

    About Me

    Somewhere, Selangor, Malaysia
    An IT by profession, a beginner in photography

    Blog Archive

    Blogger templates