List of tools to be used for 6 Sigma Belt
http://6ixsigma.org/toolbox.asp...
Saturday, November 19, 2011
Friday, November 18, 2011
Understanding the security framework behind RSA SecurID
An article published in EET which the author shares his view on weaknesses of RSA SecurID [read].
In this article, the author claims that there is vulnerability that can be used by attackers to gain access on system using RSA SecurID. I've yet to verified this but still I don't think that RSA SecurID or any of token-based security is secure enough....
Cyber warfare - Is it myth or real?
Although involving mainly information theft, cyber warfare can endanger
lives at many levels and is a reality that's here to stay, warn security
observers [read more]
The topic had been discussed withing security community since many devices are inter-connected. Shared by experience renowned speaker it came to the question of it is true or it is...
Monday, November 7, 2011
Samsung, Apple, Amazon, Perfect 10: Intellectual Property
An interesting articles by Victoria Slind-Flor about the on-going battle between Apple Inc and its rival (Samsung, HTC, etc...) and published in Bloomberg. (read it here).
This is something Microsoft have been fighting for the last few decades on its monopoly of OS. Should this be the same case or something else. In any case, as user, I do hope it...
Friday, November 4, 2011
First recorded Virus - Brain
It was not developed by US or Europe guy, instead it was developed by brothers of Pakistani. It was released in 1986 with no intention to be virus (claimed by the brothers). However, it do cause havoc in software security world.
Nevertheless, it do triggers others to develop malware until today.... read the full story here.
But their virus was not...
List of IPs and Publications
November 04, 2011Buffer Overflow, C Programs, Conference, IP, Program Analysis, Publications, Security Forum/Conference, Software Development, Web-based application
No comments:

IP
2013
Nurul Haszeli Ahmad, Fazli Mat Nor, Nagendran
Parumalai, System and Method to Secure Distribution and Execution Software
Libraries, MyIPO (submitted), 2013
2012
Nurul Haszeli Ahmad, Fazli Mat Nor, Nagendran
Parumalai, Automatic Transformation of Non-Relational Database Into Relational
Database, MyIPO, PI 2012005266, 2012
2011
Arniyati...
Making your application code multicore ready
In this product how-to article, Vector Fabrics’ Paul Stavers
describes a more efficient way to parallelize code for embedded
multicore designs illustrating the process using the company’s online
tool to parallelize Google’s VP8 video decoder... [read mo...