Friday, 9 December 2011

Pen Drive Security Threat

Pen Drive Security Threat

Pen Drive Security Threat  what is the security threat of using pendrive USB gadgets threats from pendrive Security Threat pendrivessecuritythreat pendrives threats pen drive use in computer Pen Drive Security Pen Drive images of data security pendrive gir pen drive images gir pen data storing devices data security 2
Pen drive is one of the most familiar devices with anyone who is using a computer these days. The portable gadget is growing immensely popular for its extended functionality in different sectors.
Apart from being a perfect device for storing and transferring data, the popularity of the device has been fueled by its convenience of use.
However, every technology has its downside. The more the tech-savvies run after improved technology, the more they are being exposed to the dangers that are associated with the technology. Pen drive is not an exception in this regard. Although it has simplified the process of storing volumes of data, it has its own share of threats that can be hazardous and sometimes lead to disastrous consequences.
Some of the major problems with pen derive are discussed bellow.
Virus threat:
In the corporate world, chances are their one can send virus to the PCs of an organization and disrupt functions. Earlier, the prime sources of virus to a computer were emails or floppy drives. However, the technology has evolved to check the virus from these sources and protect the PC. But, it is really difficult to detect the virus transmitted through a pen drive. Unless a company has strong anti-virus policies or unless each file in a networked is being checked for the security, it is almost impossible to protect the PCs against the virus that comes with a pen drive.
Data insecurity:
The corporate sectors across the world are vying with each other to stay afloat and at times they don`t hesitate to deploy any unethical means to get data from their rivals. If you flip the pages of history, you will find numerous instances where hackers and spies have been employed for espionage. Being a small device, pen drive creates opportunities for the miscreants to access data from unprotected PC that has an open USB port and steals information such as research data, clients` list, quotes and etc. As it is possible to store huge amount of data in the pen drive, anyone can easily bring the software in it to decode the password of the PC or hack other information.
Use of spam ware:
Sometimes, the treats come with the employees of the organization. Apart from bringing the virus, the pen drive is able to carry malicious software that can be planted in a PC by anyone. Often, the employees go against the corporate ethics and use the device to take unauthorized software and data such as shareware, games, MP3 music, software pranks, video clips, pornography pictures, etc. Moreover, the introduction of the pen drive has multiplied the threats of data insecurity and bringing bulky spamware with its available space. The organizations are more susceptible to threats as the software with password cracking ability can also be carried easily.
Prone to data Loss:
Pen drive is a very small and useful device. But the most dangerous downside of the device is that it lacks any security system. So, if you have stored data in it and it is misplaced, anyone can access the data. Due to its small size the chances of loss are high. You and your organization may be in trouble in case the data is manipulated. Of late, there have been growing demands among the pen drive users to develop the device with security system.
Companies have been taking conscious protest against the threats involved with the portable device like small drive. However, the organizations need to be extremely careful about the use of this device inside the office premises.






-- 

ALL IN ONE CREDIT CARD

All-In-One Credit Card


Quite a few of us use multiple credit cards and every time one card expires, its plastic adds to the trash. So do the numerous receipts that we accumulate after swiping our CC. The fundamental of the One Card Electronic Card is quite simple; it wants to eliminate the trash (and resolve issues like identity theft via discarded expired CCs) by proposing to be this all-credit-cards-in-one device. On one end of the gadget is a Memory Card Slot that will help the user upload their various CC Details.

The other end has a turning-knob that allows one to choose the appropriate Credit Card to be swiped. The display on the device reflects an identical copy of the CC front, while the strip on the back mimics a CC’s magnetic strip. Once the transaction is completed, the receipt generated is displayed on the device (no paper receipt) and the info gets stored on the memory card.

The concept is pretty clear in what it wants to achieve, namely combine all cards that a person uses under one umbrella, reduce generation of paper/plastic trash, identity security etc. The only block is the compatibility with various banks and the willingness of people to rely on a gadget for daily CC transactions. Yes, we do use online, virtual services, but something like this is quite different.











Saturday, 9 April 2011

Wireless Broadband at Malaysia

 This topic will eventually help you decide to subscribe to a wireless broadband provider. Definitely, Broadband at Malaysia seriously need to improve their quality of service and speed.
Now, here we are.. right down to the business

1. Celcom 3G

Good Things:
  • 3.5G speed on advanced packages (3.2mbps only)
  • Great Coverage around Malaysia. Tried the service at some Islands, Mountains and Rural Areas
  • Download Speed is fairly “OK” around city areas, the advanced package performs quite well.
Bad Things:
  • Uses one IP for all 3G modems
  • Doesn’t work well in high floors. Example would be 14th floor and higher.
  • Frequent switch between 3G and GPRS networks. It makes unwanted sign out from various Instant messenger programs.
  • High latency
  • 5GB Download limit restriction. After you pass the 5GB limit your speed will downgrade dramatically
  • Still need to pay more down payment if you are foreigner or expat
  • Almost impossible to download any Torrents or P2P, Tested using Blue Cube Modem only. Please share your own experience if it is different.
Speed:
  • Download speed is 60KB to 150KB which also varies on network availability and locations
Price:
In a range of RM78 – RM99 monthly (Subscription and down payment not included). CheckCelcom Broadband website about their latest packages. Don’t forget to read the Fair Usage Policy.
Who should subscribe this?
This is a great option if you travel around Malaysia quite a lot and you want to keep your internet on the go. If all you do are checking email and browsing facebook. Then you should get this.

2. Digi Broadband

Good things:
  • Fastest 3.5G broadband so far (Tested with advanced package). Download and Upload speeds are way faster than any other networks
  • Less latency
  • Unique IP addresses
  • Currently Petaling Jaya is fully covered under the network and provides maximum speed around there.
  • P2P and torrent downloads are allowed
Bad things:
  • Less coverage area. They are expanding as we speak. It switch to EDGE networks when 3G is not available and that can be really really slow.
  • Download limit at 10GB to 30GB depending on the size of the package. Honestly I don’t feel drastic speed reduction when I am over download limit. I strongly hope they will keep it in that way.
  • Still need to pay more down payment if you are foreigner or expat or you need to have a credit card.
Speed:
  • Download speed is 70KB to 500KB, upload speed from 90KB – 250KB
Price:
In a range of RM58 – RM188 monthly (Subscription and down payment not included). CheckDigi website about their latest packages. Here is their fair usage policy.
Who should subscribe this?
Ask yourself, are you a regular downloader? a developer? spend so much time on the internet? social media junkie? If it is “yes” then this is for you.

3. Maxis 3G Broadband

Good things:
Bad things:
  • Both download and upload speed is relatively slower than Celcom
  • P2P download blocked, so torrent downloads not allowed
  • Download limit and restriction, if not mistaken it is 1.5GB for the smallest package and 12GB max for the higher packages
  • You need to pay more down payment if you are an expatriate
Speed:
  • Download speed is 30KB to 170KB which also varies on network availability and locations
Price:
In a range of RM58 – RM178 monthly (Subscription and down payment not included). CheckMaxis website about their latest packages. Also never forget to read their usage policy (PDF).
Who should subscribe this?
If all you do is checking email then you might want this. Advanced package only able to browse social media sites effectively.

4. P1 WiMAX

Good things:
  • Stable speed with the Pro Package
  • Desktop modem and laptop modem options
  • Less latency or delay
  • P2P and torrent downloads allowed
Bad things:
  • Download Limit on all home packages from 5GB – 40GB
  • Doesn’t play well with rough weather
  • Only Pro Package works quite well
  • Less coverage area for now, if no coverage; it is not usable at all
Speed:
  • From 50KB – 350KB download speed. Upload speed unknown for now.
Price:
In a range of RM49 – RM199 monthly (Subscription and down payment not included). Checkp1 website about their latest packages. Also check Coverage area.
Who should subscribe this?
If you are a regular downloader, developer, social media junkie, then this is for you.

5. iZZi Broadband

Good things:
  • Stable line with iZZiPro desktop terminal
  • Desktop modem and laptop modem options
  • Less latency or delay (depending on the location)
  • P2P and torrent downloads allowed
  • No download limit (For now)
Bad things:
  • Need to pay the entire amount upfront
  • Consistency of the service get interrupted time to time
  • Speed is not promising
  • Doesn’t play well with rough weather
  • Less coverage
  • Overall performance is not satisfactory
Speed:
  • Download speed from 70KB to 170KB, upload speed is 25KB to 55KB
Price:
In a range of RM890 – RM1690 yearly (Subscription and down payment not included). CheckiZzi website about their latest packages. Also check Coverage area.
Who should subscribe this?
If you are a regular downloader, developer, social media junkie, then this is for you.

 
Well there you have it. I would love to know your experience about these Providers as well. Please feel free to share your comments, ratings and thoughts.
How would you Rate them?


Saturday, 18 December 2010

Nokia Netbook....


Hmm… Netbook kini mula menjadi satu trend baru dalam dunia digital dan telekomunikasi.  Ia mula diperkenalkan oleh Asus dengan model EePc mereka.  Oleh kerana mendapat sambutan yang hangat daripada pengguna, syarikat-syarikat pengeluar komputer berlumba-lumba memperkenalkan model netbook mereka. Brand apa yang menjadi pilihan hati korang?.. Apa kata korang nantikan Netbook Nokia… Ya, Betul Nokia.
Nampaknya Nokia juga tidak mahu ketinggalan untuk memperkenalkan model netbook mereka. Sesuai dengan ciri-ciri netbook itu sendiri yang sering digunakan untuk melayari web Nokia memperkenalkan Nokia Booklet 3G.
Apa yang menariknya Nokia Booklet 3G ini berbanding dengan netbook2 yang sedia ada dipasaran?
Pertamanya designnya yang amat menarik dengan finishing aluminum.
Nokia-Booklet-3G01 Booklet-Group01
Kemudian, sebagai pengeluar no 1 telefon selular dunia, sudah tentu netbook ini dilengkapi dengan 3G termasuk WIFI b,n,g dan Bluetooth. Ia juga dilengkapi dengan AGPS.
Yang amat menariknya tentang netbook ini, ianya hanya seberat 1.25kg dan baterinya boleh tahan sehingga 12jam … wow.
Pastinya harganya pon agak “menarik”nanti.

Cabaran Perbankan Internet..............

Cabaran Perbankan Internet

cabaran_internet
Perbankan internet masa kini dapt membantu kita didalam urusan seharian yang semakin sibuk. Tetapi kini pelbagai cara digunakan oleh perompak cyber ini untuk cuba untuk menipu pengguna perbankan internet. Antaranya adalah Phishing. Walaupun bunyinya hampir-hampir seperti fishing, tapi tiada kaitan pon dengan memancing. Phishing adalah satu laman web yang menyerupai seakan-akan laman web perbankan bank tertentu, untuk tujuan mengambil id dan password pengguna yang tertipu. Daripada wikipedia, phishing bermaksud :
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwordsand credit card details by masquerading as a trustworthy entity in an electronic communication.
Terdapat juga percubaan untuk menipu dengan menghantar emel kononnya daripada bank yang berkenaan mengenai masalah bank dan lain-lain.  Sebagai contoh, emel berikut diterima oleh rakan yang kononnya datang daripada Maybank:
Dear Maybank customer,
We are hereby notifying you that we’ve recently suffered a DDos-Attack on one of our’s Online Banking server. For security reasons you must complete the next steps to verify the integrity of your Maybank account. If you fail to complete the verification in the next 24 hours your account will be suspended.
Here’s how to get started:
1. Log in to Maybank online account (click here).
2. You must request for TAC via Maybank online banking – your TAC will be sent via SMS to the mobile phone number you registered.
( you can find the “Request a TAC” button in the Utilities menu of your account )
3. Logout from your account and close the browser.
4. When you have received the TAC (Transaction Authorization Code) on your mobile phone, go to our secured verification server and submit the requested information (Username, password and TAC). (click here) to go on our secured server.
5. Please allow 48 hours for processing.
Please comply and thanks for understanding.
© 2001-09 Maybank. All rights reserved.
***This is an automated message, please do not reply***
Jadi disini, aku ingin kongsi langkah-langkah berjaga-jaga yang perlu diambil untuk memastikan anda pengguna perbankan tidak terpedaya dan tertipu dengan penjenayah cyber yang cuba mengambil kesempatan atas kelalaian pengguna itu sendiri.
Ingat!! :
1) Jika anda menerima emel daripada Bank anda, tidak perlu membacanya terus delete sahaja kerana bank tidak akan menghantar emel mengenai hal-hal yang penting, bank akan terus menelefon anda atau akan menghantar surat, atau kepada anda. Bank juga tidak melakukan sebarang promosi melalui emel. Jadi ingat terus delete sahaja jika menerima emel daripada pihak bank (kononnya)
2) Update browser anda sekurang-kurangnya kepada Internet Explorer 7 atau Mozilla Firefox 3 kerana browser terkini dilengkapi dengan anti-phishing yang dapat mengesan bahawa laman web tersebut adalah laman web palsu.
3) Jangan tekan sebarang link yang berkaitan dengan login bank. Kerana mungkin link tersebut akan bawa anda pergi ke laman web palsu.  Contohnya seperi emel yang diterima daripada rakan aku tadi ada link kononnya secured server yang baru :
When you have received the TAC (Transaction Authorization Code) on your mobile phone, go to our secured verification server and submit the requested information (Username, password and TAC). (click here) to go on our secured server.
Hanya masuk melalui laman web rasmi bank anda dengan menaip pada browser yang baru dibuka. Cth : www.maybank2u.com.my utk Maybank dan www.cimbclicks.com.my utk CIMB.
4) Jangan menggunakan perbankan internet di cyber cafe atau komputer awam, kerana diragui dipasang alat keylogger atau software yang seumpamanya yang bertujuan utk mengetahui aktiviti anda.
5) Update antivirus anda untuk mengelak daripada backdoor atau keylogger dipasang pada pc anda yang dapat mengetahui aktiviti anda terutama perbankan internet.
Dengan tips ini diharapkan agar sang durjana akan tumbang untuk memperdaya pengguna perbankan internet di Malaysia. Untuk maklumat lanjut mengenai security cyber korang boleh cuba-cuba lihat laman web ini (CyberSecurity Malaysia) dan eSecurity Malaysia yang turut memuatkan video tips-tips menarik tentang security.

Windows x32 detect 4GB RAM?

Windows x32 detect 4GB RAM?

Jika belum tahu, Windows kini terdapat 2 versi iaitu 32bit dan 64bit. Ianya bermula dengan Windows XP 64bit semasa AMD mengeluarkan processor AMD64 mereka. Windows 32bit dikenali dengan x86 iaitu architecture PC dan Windows 64bit dikenali sebagai x64 iaitu architecture x86-64 (extension).
Apa perbezaannya?, actually banyak perbezaannya tetapi aku nak highlight satu je. Windows x64 atau 64bit mampu menggunakan lebih daripada 4GB RAM. Jika korang menggunakan Windows x86 (32bit), hanya 3.0GB / 3.5GB yang dapat digunakan. Tak kisah la korang tambah 8GB RAM pada komputer korang, tapi apabila bukak windows hanya 3.00GB Physical Memory sahaja yang dapat digunakan. Itu adalah limitation 32bit. Untuk menggunakan lebih 4gb of RAM, korang kenalah guna Windows x64. Walaupun x64 banyak kelebihannya terutama performance gain yang korang dapat jika menggunakan native 64bit application seperti Adobe Photoshop 64bit. Namun begitu, ramai yang masih memilih 32bit windows sebab-sebab seperti Drivers 64bit dan juga Application compatibility.
windows-32-bit-ram-limit
Yang peliknya, Windows Server 2003 dan 2008 walaupun menggunakan versi 32bit (x86) ia mampu menggunakan lebih 4GB kenapa tidak kepada Vista mahupun Windows 7? Mungkin Microsoft mempunyai sebab-sebab tertentu. Tu hak mereka.
Namun begitu kini terdapat cara untuk membenarkan Windows Vista, Windows 7 32bit korang dapat menggunakan lebih 4GB of RAM.  Kini terdapat Kernel Patch yang membenarkan ianya berlaku seperti itu. Mana nk dapat patch ni? hehe search je kat google.

windows-vista-x86-patch

Bengkel APAC - GEG Asia- Pacific Connect

 Sertai bengkel teknologi pendidikan selama tiga hari anjuran GEG Asia- Pacific Connect yang akan berlangsung dalam pelbagai bahasa di Asia-...