Thursday 19 February 2009

Protect your mobile : anywhere, anytime !

Many endpoint security solutions protect laptops and remote client tools only when they are connected to the network, leaving these devices open to malicious attacks and data interception. Implementing a comprehensive approach to endpoint security can mitigate the risks of theft, malware, and other vulnerabilities to increase data protection and help your company avoid the consequences of information loss and leakage.

Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.

This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.

Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.

Protect your mobile : anywhere, anytime !

Many endpoint security solutions protect laptops and remote client tools only when they are connected to the network, leaving these devices open to malicious attacks and data interception. Implementing a comprehensive approach to endpoint security can mitigate the risks of theft, malware, and other vulnerabilities to increase data protection and help your company avoid the consequences of information loss and leakage.

Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.

This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.

Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.

Protect your mobile : anywhere, anytime !

Many endpoint security solutions protect laptops and remote client tools only when they are connected to the network, leaving these devices open to malicious attacks and data interception. Implementing a comprehensive approach to endpoint security can mitigate the risks of theft, malware, and other vulnerabilities to increase data protection and help your company avoid the consequences of information loss and leakage.

Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.

This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.

Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.

Monday 16 February 2009

MWC 2009 : Thinkforward from Mobile World Congress, Barcelona


GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.

With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.

Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:

A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators

MWC 2009 : Thinkforward from Mobile World Congress, Barcelona


GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.

With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.

Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:

A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators

MWC 2009 : Thinkforward from Mobile World Congress, Barcelona


GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.

With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.

Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:

A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators

Thursday 12 February 2009

VoIP Next-Generation Network Overview

As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.

 

voip-arch
example of VoIP Next Generation Network architecture

 

Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:

· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection

These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.


VoIP Next-Generation Network Overview

As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.

 

voip-arch
example of VoIP Next Generation Network architecture

 

Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:

· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection

These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.


VoIP Next-Generation Network Overview

As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.

 

voip-arch
example of VoIP Next Generation Network architecture

 

Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:

· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection

These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.


Wednesday 11 February 2009

Dell Latitude XT2 : Ready to take challenge

Dell Latitude XT2

It seems Dell never give up with their tablet PC product. The latest Dell Latitude XT2 has been released in Korea with big changes from previous models. Based on the info from Dell, upcoming Latitude XT2 tablet will boast an Intel Core 2 Duo ULV SU9400, clocked at 1.4GHz, coupled with a Montevina chipset. The tablet also sports an Intel integrated GMA 4500MHD graphics solution, meant to deliver the graphics support required by the 12.1-inch LED backlit capacitive touch-screen with EM Digitizer pen. The small form factor should allow the Latitude XT2 users to easily take advantage of the tablet’s features, no matter where their work may take them.
The storage will be at 120GB SATA and upgradable to 128 GB Solid State Drive (SSD). With the maximum support up to 5GB RAM, this model would give a great shoot on the perfromance.
Specification:

No
Specification
Description
1
Model
Dell Latitude XT2
2
Processor
Intel Core 2 Duo  ULV SU9400 (1.4 GHz)
3
RAM
Max. 5 GB DDR3
4
Graphic Adaptor
Integrated Intel GMA 4500MHD
5
Storage
120 SATA / 128 SSD
6
Screen
12.1”capacitive touch screen
7
Input
2 X USB 2.0, firewire, Express Card

Dell Latitude XT2 : Ready to take challenge

Dell Latitude XT2

It seems Dell never give up with their tablet PC product. The latest Dell Latitude XT2 has been released in Korea with big changes from previous models. Based on the info from Dell, upcoming Latitude XT2 tablet will boast an Intel Core 2 Duo ULV SU9400, clocked at 1.4GHz, coupled with a Montevina chipset. The tablet also sports an Intel integrated GMA 4500MHD graphics solution, meant to deliver the graphics support required by the 12.1-inch LED backlit capacitive touch-screen with EM Digitizer pen. The small form factor should allow the Latitude XT2 users to easily take advantage of the tablet’s features, no matter where their work may take them.
The storage will be at 120GB SATA and upgradable to 128 GB Solid State Drive (SSD). With the maximum support up to 5GB RAM, this model would give a great shoot on the perfromance.
Specification:

No
Specification
Description
1
Model
Dell Latitude XT2
2
Processor
Intel Core 2 Duo  ULV SU9400 (1.4 GHz)
3
RAM
Max. 5 GB DDR3
4
Graphic Adaptor
Integrated Intel GMA 4500MHD
5
Storage
120 SATA / 128 SSD
6
Screen
12.1”capacitive touch screen
7
Input
2 X USB 2.0, firewire, Express Card

Dell Latitude XT2 : Ready to take challenge

Dell Latitude XT2

It seems Dell never give up with their tablet PC product. The latest Dell Latitude XT2 has been released in Korea with big changes from previous models. Based on the info from Dell, upcoming Latitude XT2 tablet will boast an Intel Core 2 Duo ULV SU9400, clocked at 1.4GHz, coupled with a Montevina chipset. The tablet also sports an Intel integrated GMA 4500MHD graphics solution, meant to deliver the graphics support required by the 12.1-inch LED backlit capacitive touch-screen with EM Digitizer pen. The small form factor should allow the Latitude XT2 users to easily take advantage of the tablet’s features, no matter where their work may take them.
The storage will be at 120GB SATA and upgradable to 128 GB Solid State Drive (SSD). With the maximum support up to 5GB RAM, this model would give a great shoot on the perfromance.
Specification:

No
Specification
Description
1
Model
Dell Latitude XT2
2
Processor
Intel Core 2 Duo  ULV SU9400 (1.4 GHz)
3
RAM
Max. 5 GB DDR3
4
Graphic Adaptor
Integrated Intel GMA 4500MHD
5
Storage
120 SATA / 128 SSD
6
Screen
12.1”capacitive touch screen
7
Input
2 X USB 2.0, firewire, Express Card

Tuesday 10 February 2009

Email Security: How to Send Encrypted Emails

Using GPG with popular email software

Many popular Linux email clients (Like Evolution and Kmail) have built-in features that allow them to interact with GPG. To enable encryption in Mozilla Thunderbird, you must install Enigmail.

If you are using Evolution, you should compose your message as you normally would and then select PGP Encrypt from the Security menu in the message composition window. Once you do this, Evolution will query the keyservers. If Evolution is able to find a key that matches the email address of the recipient, your message will be automatically encrypted as it is sent.

 

Kmail and Thunderbird handle encryption in much the same way. Unlike Evolution, Kmail or Thunderbird will not automatically query the keyservers to match the recipient email address with, but will only allow you to use the public keys you have installed on your computer. After you have chosen a key, the message will be encrypted with it and sent. While this encryption process is not as automated as Evolution’s, it does prevent the small possibility of automatically encrypting with an old or expired key that the recipient no longer uses.

Source: ERM Blog

Email Security: How to Send Encrypted Emails

Using GPG with popular email software

Many popular Linux email clients (Like Evolution and Kmail) have built-in features that allow them to interact with GPG. To enable encryption in Mozilla Thunderbird, you must install Enigmail.

If you are using Evolution, you should compose your message as you normally would and then select PGP Encrypt from the Security menu in the message composition window. Once you do this, Evolution will query the keyservers. If Evolution is able to find a key that matches the email address of the recipient, your message will be automatically encrypted as it is sent.

 

Kmail and Thunderbird handle encryption in much the same way. Unlike Evolution, Kmail or Thunderbird will not automatically query the keyservers to match the recipient email address with, but will only allow you to use the public keys you have installed on your computer. After you have chosen a key, the message will be encrypted with it and sent. While this encryption process is not as automated as Evolution’s, it does prevent the small possibility of automatically encrypting with an old or expired key that the recipient no longer uses.

Source: ERM Blog

Email Security: How to Send Encrypted Emails

Using GPG with popular email software

Many popular Linux email clients (Like Evolution and Kmail) have built-in features that allow them to interact with GPG. To enable encryption in Mozilla Thunderbird, you must install Enigmail.

If you are using Evolution, you should compose your message as you normally would and then select PGP Encrypt from the Security menu in the message composition window. Once you do this, Evolution will query the keyservers. If Evolution is able to find a key that matches the email address of the recipient, your message will be automatically encrypted as it is sent.

 

Kmail and Thunderbird handle encryption in much the same way. Unlike Evolution, Kmail or Thunderbird will not automatically query the keyservers to match the recipient email address with, but will only allow you to use the public keys you have installed on your computer. After you have chosen a key, the message will be encrypted with it and sent. While this encryption process is not as automated as Evolution’s, it does prevent the small possibility of automatically encrypting with an old or expired key that the recipient no longer uses.

Source: ERM Blog

Wednesday 4 February 2009

Malaysian broadband information

In Malaysia, we have both wired and and wireless broadband internet connectivity. We might used it in our daily life, but some of us might not know which technology of broadband he/she is using. Following is the list of all the broadband internet technology used in Malaysia:

Wired
  • DSL - currently used by TMnet Streamyx
  • FTTx - known as HSBB, it will be upcoming broadband technology which using fiber optic. Currently used by sentrelFon, penangFon, TimeDotCom, Maxis, TM.
Wireless
  • Wimax  - currently used by packet one(P1), YTLcomms, AMAX, REDtone
  • HSPA  - known as 3.5G, currently used by MAXIS, Celcom, DiGi, UMobile
  • LTE - known as next generation of hspa by 3gpp, theoretically can up to 100Mbps download and 50Mbps upload.
  • iBurst  - currently used by izzi
Both wired and wireless broadband have their pros and cons, for user who prefer fast speed, stable connectivity and low latency must opt for wired broadband, for user who want mobility then opt for wireless broadband.

Of course you cannot compare directly between wired and wireless broadband. Wireless is transferring data over the air which will have interference, but this will not happen for wired broadband. Anyway, I believe the trend in moving into wireless. Just like our home-line, everybody is changing into mobile phone nowadays.

Malaysian broadband information

In Malaysia, we have both wired and and wireless broadband internet connectivity. We might used it in our daily life, but some of us might not know which technology of broadband he/she is using. Following is the list of all the broadband internet technology used in Malaysia:

Wired
  • DSL - currently used by TMnet Streamyx
  • FTTx - known as HSBB, it will be upcoming broadband technology which using fiber optic. Currently used by sentrelFon, penangFon, TimeDotCom, Maxis, TM.
Wireless
  • Wimax  - currently used by packet one(P1), YTLcomms, AMAX, REDtone
  • HSPA  - known as 3.5G, currently used by MAXIS, Celcom, DiGi, UMobile
  • LTE - known as next generation of hspa by 3gpp, theoretically can up to 100Mbps download and 50Mbps upload.
  • iBurst  - currently used by izzi
Both wired and wireless broadband have their pros and cons, for user who prefer fast speed, stable connectivity and low latency must opt for wired broadband, for user who want mobility then opt for wireless broadband.

Of course you cannot compare directly between wired and wireless broadband. Wireless is transferring data over the air which will have interference, but this will not happen for wired broadband. Anyway, I believe the trend in moving into wireless. Just like our home-line, everybody is changing into mobile phone nowadays.

Malaysian broadband information

In Malaysia, we have both wired and and wireless broadband internet connectivity. We might used it in our daily life, but some of us might not know which technology of broadband he/she is using. Following is the list of all the broadband internet technology used in Malaysia:

Wired
  • DSL - currently used by TMnet Streamyx
  • FTTx - known as HSBB, it will be upcoming broadband technology which using fiber optic. Currently used by sentrelFon, penangFon, TimeDotCom, Maxis, TM.
Wireless
  • Wimax  - currently used by packet one(P1), YTLcomms, AMAX, REDtone
  • HSPA  - known as 3.5G, currently used by MAXIS, Celcom, DiGi, UMobile
  • LTE - known as next generation of hspa by 3gpp, theoretically can up to 100Mbps download and 50Mbps upload.
  • iBurst  - currently used by izzi
Both wired and wireless broadband have their pros and cons, for user who prefer fast speed, stable connectivity and low latency must opt for wired broadband, for user who want mobility then opt for wireless broadband.

Of course you cannot compare directly between wired and wireless broadband. Wireless is transferring data over the air which will have interference, but this will not happen for wired broadband. Anyway, I believe the trend in moving into wireless. Just like our home-line, everybody is changing into mobile phone nowadays.