My experience on my daily works... helping others ease each other

Tuesday, February 28, 2012

MIR Labs membership

Alhamdulillah, today I was accepted as part of MIR Labs community which focusing on R&D in various area. This is an opportunity for me to create a good relationship and networking with many experts from various research area thus allowed us sharing knowledge and experience for better world.

As of now, I'm part of 2 interesting and excellent organization. The first one is Internet Society (ISOC) which I joined and accepted as members on middle of 2011. MIR Labs is the second organization. On top of this, I'm already a certified EC-SP and EC-CEH since 2009. With this two membership and certification, and more in the future, I hope that I will be able to contributes back and gain more knowledge and experience.

In the future, I'm planning to be part of OSS community group and Software Development too.

You can view my profile on both organization (and you can join me too) at:

  1. My Profile at ISOC
  2. My Profile at MIR Labs
Share:

Monday, February 27, 2012

ISOC Fellowship to the IETF (IETF 84 and 85)

The Internet Society has announced that it is inviting applications for its latest Internet Society Fellowships to the IETF.  The Fellowship programme allows engineers from emerging and developing economies to attend an Internet Engineering Task Force (IETF) meeting.

As you know, the IETF is the Internet's premier standards-making body, responsible for the development of protocols used in IP-based networks. IETF participants represent an international community of network designers, operators, vendors, and researchers involved in the technical operation of the Internet and the continuing evolution of Internet architecture.

Fellowships will be awarded through a competitive application process. The Internet Society is currently accepting fellowship applications for the next two IETF meetings:

 * IETF 84, July 29 - August 3, 2012, Vancouver, BC, Canada

 * IETF 85, November 4-9, 2012, Atlanta, GA, USA


http://www.internetsociety.org/what-we-do/education-and-leadership-...


Fellowship applications for both IETF meetings are due by 23 March 2012.

The Internet Society Fellowships to the IETF are sponsored by Afilias, Google, Microsoft, and Intel.


Credit to Julian Vincent on February 28, 2012 at 8:49am (via ISOC Malaysia Chapter)
Share:

Invitation to join MIR Labs Society

Dear Colleague,

Greetings! Thank you for contributing a paper and making IAS 2011 a success. Machine Intelligence Research Labs (MIR Labs) Society was established in 2008 and today we have presence in nearly 80+ countries (http://www.mirlabs.org). The main objectives of MIR Labs are as follows.

- To initiate new innovative research directions by networking together the critical mass of resources
- To strengthen scientific and technological excellence on a particular research area, which is important to a particular geographical region / area / country etc.
- To integrate the various research efforts of the scientific team to be a source of innovation on possible scientific, technological and socio-economic trajectories to mould the future of Machine Intelligence
- To promote and sponsor scientific activities (conferences and workshops) in developing and under represented countries by offering mentoring, technical assistance etc.

We welcome you to join the society by using the form available online:
http://www.mirlabs.net/global/  (click the join link on the top right corner).

A full membership is open only to PhD degree holders, while all research active junior members will join as student members, which can be upgraded anytime.

The membership is * free * and members are entitled to get discounts in our upcoming conferences. The online application form will be reviewed by a panel of three members and a decision will be made within 5 business days.

You may also forward this invitation to your friends , colleagues who are also research active.

The goal of the society is to help researchers and scientists to become innovators of the society and to actively contribute in the research and development progress. Our plans include opportunities for
focused, practical and accessible professional development and annual conferences. There are also many opportunities for members to assume leadership roles in the Societies, including serving as Technical
Committee panels (which are currently being formed), organizing a conference / workshop etc, guest editorships etc.

If you have any questions/comments/suggestions, please email: ajith.abraham@ieee.org

If you are already a member and if your profile is listed on the web site, then you may please discard this email. You may wish to update the profile by using the online form.

Looking forward to hearing from you soon.

Yours sincerely,

MIR Labs Society
http://www.mirlabs.net
Share:

Penetration Testing

In this article, the author shared about briefly about penetrating testing. Check it out http://www.ja.net/documents/publications/factsheets/082-penetration-testing.pdf
Share:

Saturday, February 25, 2012

Weekend Reading

Few articles to read...

  1. Why Less Emphasis on Software Security? - Author of the article raised a valid concern on reluctant of many security expert and software house to focus on making a secure software. Except Microsoft (via Bill Gates's Memo in 2004 that stresses on making software trustworthy), others are more focusing on bugs and errors after released. TPM introduce by TCG (Trust Computing Group) is nothing but just a defense mechanism after produce released and ONLY limited to hashing of hardware and software without knowing what is the things it is hashing. Anyway, this is my opinion. Please read a simple yet important article at InfoSec Island by Keith Mendoza.


  2. Encryption Key Management Primer - Requirements 3.6 - In this article, PCI Guru, is sharing his thought on the wrong perception of many of us including speculation by the quantum group that encryption key has expiration date. Read the full article here.


  3. Remote Attack Code for Symantec's pcAnywhere in the Wild - Author of the article sharing stories on Symantec software that was released to public which allowed attackers to use and exploit user whom uses Symantec's pcAnywhere tool. Read the full article here
Share:

Wednesday, February 22, 2012

World Economic Forum - Global Risk 2012

Economic imbalances and social inequality risk reversing the gains of globalization, warns the World Economic Forum in its report Global Risks 2012. These are the findings of a survey of 469 experts and industry leaders, indicating a shift of concern from environmental risks to socioeconomic risks compared to a year ago. Respondents worry that further economic shocks and social upheaval could roll back the progress globalization has brought, and feel that the world’s institutions are ill-equipped to cope with today’s interconnected, rapidly evolving risks. The findings of the survey fed into an analysis of three major risk cases: Seeds of Dystopia; Unsafe Safeguards and the Dark Side of Connectivity. 

The report analyses the top 10 risks in five categories - economic, environmental, geopolitical, societal and technological - and also highlights "X Factor" risks, the wild card threats which warrant more research, including a volcanic winter, cyber neotribalism and epigenetics, the risk that the way we live could have harmful, inheritable effects on our genes. Key crisis management lessons from Japan’s earthquake, tsunami and nuclear disasters are highlighted in a special chapter.

Get more insight @ Global Risks 2012 - Seventh Edition

The key statement of the report related to Information Security can be read at
https://community.rapid7.com/community/infosec/blog/2012/02/22/key-statements-from-the-global-risks-2012-report

Summary:
The report lists 10 technological risks:
  1. Critical systems failure: single-point system vulnerabilities trigger cascading failure of critical information infrastructure and networks.
  2. Cyber attacks: state-sponsored, state-affiliated, criminal or terrorist cyber attacks.
  3. Failure of intellectual property regime: ineffective intellectual property protections undermine research and development, innovation and investment.
  4. Massive digital misinformation: deliberately provocative, misleading or incomplete information disseminates rapidly and extensively with dangerous consequences.
  5. Mineral resource supply vulnerability: growing dependence of industries on minerals that are not widely sourced with long extraction-to-market time-lag for new sources.
  6. Massive incident of data fraud/ theft: criminal or wrongful exploitation of private data on an unprecedented scale.
  7. Proliferation of orbital debris: Rapidly accumulating debris in high-traffic geocentric orbits jeopardizes critical satellite.   
  8. Unintended consequences of climate change mitigation: Rapidly accumulating debris in high-traffic geocentric orbits jeopardizes critical satellite infrastructure. Attempts at geoengineering or renewable energy development result in new complex challenges.
  9. Unintended consequences of nanotechnology: The manipulation of matter on an atomic and molecular level raises concerns on nanomaterial toxicity.
  10. Unintended consequences of new life science technologies: Advances in genetics and synthetic biology produce unintended consequences, mishaps or are used as weapons.
Share:

Tuesday, February 21, 2012

White Hat Hackers Flowchart

klik to enlarge
Credit to Dan Kaminsky
Share:

Sunday, February 19, 2012

HijackThis goes open source

One of the best tool for forensic, hackers, and even for system administrator is now open source. HijackThis is well known for its capability to search all registry and allowed user to change or edit without having access as administrator. It is put as open source by the company. It can be good and bad but lets hope for the best :)

Check it out at http://news.slashdot.org/story/12/02/19/1543245/security-tool-hijackthis-goes-open-source
Share:

Interesting article for weekend read-up

Hi guys, wish all of you a good weekend. I was not in good health condition. Got flue... but is becoming ok...
Well, I came across with few interesting articles and would like to share with you. Check it out


  1. 15 worst data security breach in 21st century (as of now) by CSO Online - http://www.csoonline.com/article/700263/the-15-worst-data-security-breaches-of-the-21st-century
  2. FTC website hacked and defaced by Infosec Island - http://www.infosecisland.com/blogview/20366-Anonymous-Hacks-and-Defaces-FTC-Websites.html
  3. Don't know which information security certifications to take? Read this article from Infosec Island - http://www.infosecisland.com/blogview/20326-The-Differences-Between-Security-Certifications.html?utm_source=ProvideSecurity&utm_medium=twitter
  4. Latest news on Chinese Telco. What's wrong with them? http://www.infosecisland.com/blogview/20367-Intelligence-Committee-Continues-Probe-into-Chinese-Telecoms.html?utm_source=twitterfeed&utm_medium=twitter&utm_term=%23InfoSec


Share:

Sunday, February 12, 2012

Attacking Google+

I'm not sure if this still applicable or not as the article was release on August 2011. Google might have solved the issue. But it should not stop us from thinking few defense mechanism against this attack.

Check it out this article, DDOS attack using Google+, for detail and the sample script.
Share:

Thursday, February 2, 2012

Facebook IPO

Who Owns Facebook?

As published in Forbes Online
Share:

Wednesday, February 1, 2012

Microsoft DOS xcopy command

About xcopy
Xcopy is a powerful version of the copy command with additional features; has the capability of moving files, directories, and even whole drives from one location to another.

Availability
The xcopy command is an external command that is available in the below Microsoft operating systems
Tip Users running more recent versions of Windows should also consider using robocopy.

Syntax
Windows 2000 and XP xcopy syntax
XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W] [/C] [/I] [/Q] [/F] [/L] [/H] [/R] [/T] [/U]
[/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z] [/EXCLUDE:file1[+file2][+file3]...]
sourceSpecifies the file(s) to copy.
destinationSpecifies the location or name of new files.
/ACopies only files with the archive attribute set, doesn't change the attribute.
/MCopies only files with the archive attribute set, turns off the archive attribute.
/D:m-d-yCopies files changed on or after the specified date. If no date is given, copies only those files whose source time is newer than the destination time.
/EXCLUDE:file1 [+file2][+file3]...Specifies a list of files containing strings. When any of the strings match any part of the absolute path of the file to be copied, that file will be excluded from being copied. For example, specifying a string like \obj\ or .obj will exclude all files underneath the directory obj or all files with the .obj extension respectively.
/PPrompts you before creating each destination file.
/SCopies directories and subdirectories except empty ones.
/ECopies directories and subdirectories, including empty ones. Same as /S /E. May be used to modify /T.
/VVerifies each new file.
/WPrompts you to press a key before copying.
/CContinues copying even if errors occur.
/IIf destination does not exist and copying more than one file, assumes that destination must be a directory.
/QDoes not display file names while copying.
/FDisplays full source and destination file names while copying.
/LDisplays files that would be copied.
/HCopies hidden and system files also.
/ROverwrites read-only files.
/TCreates directory structure, but does not copy files. Does not include empty directories or subdirectories. /T /E includes empty directories and subdirectories.
/UCopies only files that already exist in destination.
/KCopies attributes. Normal Xcopy will reset read-only attributes.
/NCopies using the generated short names.
/OCopies file ownership and ACL information.
/XCopies file audit settings (implies /O).
/YSuppresses prompting to confirm you want to overwrite an existing destination file.
/-YCauses prompting to confirm you want to overwrite an existing destination file.
/ZCopies networked files in restartable mode.
The switch /Y may be preset in the COPYCMD environment variable.
This may be overridden with /-Y on the command line.

Windows 98 and older xcopy syntax
Copies files and directory trees.
XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/W] [/C] [/I] [/Q] [/F] [/L] [/H] [/R] [/T] [/U] [/K] [/N]
sourceSpecifies the file(s) to copy.
destinationSpecifies the location or name of new files.
/ACopies files with the archive attribute set, doesn't change the attribute.
/MCopies files with the archive attribute set, turns off the archive attribute.
/D:dateCopies files changed on or after the specified date. If no date is given, copies only those files whose source time is newer than the destination time.
/PPrompts you before creating each destination file.
/SCopies directories and sub directories except empty ones.
/ECopies directories and sub directories, including empty ones. Same as /S /E. May be used to modify /T.
/WPrompts you to press a key before copying.
/CContinues copying even if errors occur.
/IIf destination does not exist and copying more than one file, assumes that destination must be a directory.
/QDoes not display file names while copying.
/FDisplays full source and destination file names while copying.
/LDisplays files that would be copied.
/HCopies hidden and system files also.
/ROverwrites read-only files.
/TCreates directory structure, but does not copy files. Does not include empty directories or sub directories. /T /E includes empty directories and sub directories.
/UUpdates the files that already exist in destination.
/KCopies attributes. Normal xcopy will reset read-only attributes.
/YOverwrites existing files without prompting.
/-YPrompts you before overwriting existing files.
/NCopy using the generated short names.
Examples
xcopy c:\temp /e
The above example is the basic xcopy command to copy the files, directories, and subdirectories to the directory you're currently in.
xcopy "c:\documents and settings\hope" /e
In the above example the xcopy command would copy all files and directories in the user "hope" directory to the directory or drive you're currently in.
xcopy h:\*.* /a /e /k
The above command would copy everything located on the H drive to the drive you are currently on.
Additional examples and information about how to copy directories in MS-DOS and other operating systems including Windows can also be found on document CH000838.

Questions and answers
Getting Invalid number of parameters error
This error occurs when you're typing a directory in the MS-DOS or the Windows command line that has spaces in it. For example using the xcopy command to copy files in theDocuments and Settings folder. When typing a directory with spaces in MS-DOS make sure to surround the path with quotes. For example, instead of typing: c:\documents and settings type "c:\documents and settings".

Cannot perform a cyclic copy
This error occurs when you're trying to copy all directories and files and that directory also contains the directory you're copying all the files to. If this command were to be allowed it would get into a loop and would never stop copying the same files over and over. When using the xcopy command if you're copying all subdirectories you must copy those files and folders to a completely separate directory or drive.

Parse error
This error occurs when the command you're typing in has invalid syntax. For example, if you're surrounding your path in quotes and leave out the ending quotes.

I attempted to use the above xcopy command and was not able to copy all files within my favorites folder.
After further examination, Computer Hope also encountered this issue. However, was able to copy the majority of all favorites by using the below command.

xcopy c:\windows\favorites\*.* /e /k /i /c
We are under the impression that this issue is generated because of the way that Internet Explorer saves the URL (favorite) using long file names as well as extended characters. 
Share:

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Blog Archive

Blogger templates