My experience on my daily works... helping others ease each other

Saturday, May 28, 2011

The problem with static analyzers

Static analyzers offer a lot of capability. They could easily go a lot further. At the recent Embedded Systems Conference in Silicon Valley I had the chance to talk to several vendors of static analyzers. These are the tools that evaluate your program to find potential runtime problems, like variables going out of bounds or dereferences of null...
Share:

Friday, May 27, 2011

Researcher finds LinkedIn security flaw

New Delhi-based security expert says LinkedIn access cookie only expires after one year, potentially allowing hacker access to user accounts without need for passwords, according to news report [read more]. The first time I read it through, I thought, is this serious? Is it real? And the next steps was to evaluate what the articles said and the...
Share:

Sunday, May 22, 2011

Avoiding yourself as spam-sender

Last week, I notice something weird. I received few junk email and bounce-email indicating that I'm sending a link to all person in my contact list. A few of my friend even open the mail and try to open the link. I don't know who, how, and when it happen by I realize that something has gone wrong. Either someone had gain access to my laptop or successfully...
Share:

In-memory analytics plugs real-time need

Business analytics based on in-memory computing will continue to gain traction even as companies try to make sense--in real-time--of the ever-increasing volume of data generated, noted an analyst.   Daniel Zoe-Jimenez, program manager of enterprise applications and information management at IDC Asia-Pacific, said that in-memory computing,...
Share:

Javascript are now as powerful than vbscript - Is it?

The latest project to emerge from prolific programmer Fabrice Bellard is a JavaScript program that runs Linux on an emulated x86 processor within a browser [read mor...
Share:

Could Sony have prevented breach?

Failure to address "insecure" infrastructure may have led to attack on electronics giant, says security expert, who also warns loss of customer data may be "tip of the iceberg" [read more]. When something happen, most people are looking forward to pinpoint someone or something causing the problem/issue. We are likely to search for root cause of...
Share:

Conference - Coming soon

2011 Summer Simulation Multiconference (SummerSim'11) 27 June 2011 The Hague Netherlands 2011 International Conference on Software and Computer Applications (ICSCA 2011) 01 July 2011 Kathmandu Nepal Malaysia Open Source Conference 2011 (MOSC2011) 03 July 2011 Penang Malaysia 2011 International Conference on Image and Vision...
Share:

Monday, May 16, 2011

Clearing up the mesh about wireless networking topologies: Part 2

Having covered the basics of wireless networking in Part 1, as well as the criteria for evaluating the various topologies, it is now time to look closely at five different network architectures - point-to-multipoint, Zigbee 2007, Wireless Hart, 6LoWPAN, and on-demand distance vector routing - and assess their strengths and limitations [read mor...
Share:

Securing SoC Platform Oriented Architectures with a hardware Root of Trust

While it has long been the purview of electronic product vendors to rise to the challenges of managing ever shortening product life cycles, a new trend is afoot that may turn the tables in favor of longer platform hardware life cycles. As embedded programmable processor based features increase in power, increasingly sophisticated platform System...
Share:

Securing USB Transmission

As more and more embedded designs move toward communicating with computers, there is a growing demand for USB connectivity. USB doesn't have a built in security mechanism for securing the data communicated on the bus. For some applications, this might be a concern. USB defines several sets of device classes that specify how these devices operate....
Share:

Bullet-proofing your software design

In August 2003, a rolling blackout affected 10 million people in Ontario and 45 million people in the eastern part of the United States, raising concern that a cyber-attack by a hostile force was underway. Ultimately the causes of the blackout were traced to a slew of system, procedural, and human errors and not an act of aggression. Nevertheless,...
Share:

Things to consider when securing an embedded 802.11 Wi-Fi device

What are things you need to consider when you are securing your wireless devices? As we all know, most of security implementation focusing on wired devices. Only less implemented in wireless environment and the wireless devices still need a wired devices to enable its functions. Lets take a look on article written by Timothy Stapko on things you need...
Share:

Is the SCADA Infrastructures Secure?

Governors and others frequently bemoan the lack of investment being made in crumbling infrastructure. Bridges, tunnels and the rest of the brick and mortar that enables our lives are in disrepair, and we're told things are getting worse. Shrinking budgets insure that repairs will continue to fall behind. Pundits also say the electric grid is old...
Share:

Saturday, May 7, 2011

IGF 2011 Ambassadors Programme – Call for Applications

ISOC MALAYSIA ChapterTHE INTERNET IS FOR EVERYONEA message to all members of ISOC MALAYSIA Chapter IGF 2011 Ambassadors Programme – Call for Applications The Internet Society is pleased to announce a call for applications to participate in the Internet Society (ISOC) Ambassador programme to the Internet Governance...
Share:

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Labels

Blog Archive

Blogger templates