Thursday 19 February 2009
Protect your mobile : anywhere, anytime !
Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.
This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.
Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.
Protect your mobile : anywhere, anytime !
Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.
This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.
Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.
Protect your mobile : anywhere, anytime !
Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.
This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.
Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.
Monday 16 February 2009
MWC 2009 : Thinkforward from Mobile World Congress, Barcelona
GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.
With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.
Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:
A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators
MWC 2009 : Thinkforward from Mobile World Congress, Barcelona
GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.
With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.
Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:
A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators
MWC 2009 : Thinkforward from Mobile World Congress, Barcelona
GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.
With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.
Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:
A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators
Thursday 12 February 2009
VoIP Next-Generation Network Overview
As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.
example of VoIP Next Generation Network architecture
Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:
· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection
These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.
VoIP Next-Generation Network Overview
As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.
example of VoIP Next Generation Network architecture
Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:
· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection
These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.
VoIP Next-Generation Network Overview
As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.
example of VoIP Next Generation Network architecture
Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:
· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection
These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.
Wednesday 11 February 2009
Dell Latitude XT2 : Ready to take challenge
No | Specification | Description |
1 | Model | Dell Latitude XT2 |
2 | Processor | Intel Core 2 Duo ULV SU9400 (1.4 GHz) |
3 | RAM | Max. 5 GB DDR3 |
4 | Graphic Adaptor | Integrated Intel GMA 4500MHD |
5 | Storage | 120 SATA / 128 SSD |
6 | Screen | 12.1”capacitive touch screen |
7 | Input | 2 X USB 2.0, firewire, Express Card |
Dell Latitude XT2 : Ready to take challenge
No | Specification | Description |
1 | Model | Dell Latitude XT2 |
2 | Processor | Intel Core 2 Duo ULV SU9400 (1.4 GHz) |
3 | RAM | Max. 5 GB DDR3 |
4 | Graphic Adaptor | Integrated Intel GMA 4500MHD |
5 | Storage | 120 SATA / 128 SSD |
6 | Screen | 12.1”capacitive touch screen |
7 | Input | 2 X USB 2.0, firewire, Express Card |
Dell Latitude XT2 : Ready to take challenge
No | Specification | Description |
1 | Model | Dell Latitude XT2 |
2 | Processor | Intel Core 2 Duo ULV SU9400 (1.4 GHz) |
3 | RAM | Max. 5 GB DDR3 |
4 | Graphic Adaptor | Integrated Intel GMA 4500MHD |
5 | Storage | 120 SATA / 128 SSD |
6 | Screen | 12.1”capacitive touch screen |
7 | Input | 2 X USB 2.0, firewire, Express Card |
Tuesday 10 February 2009
Email Security: How to Send Encrypted Emails
Using GPG with popular email software
Many popular Linux email clients (Like Evolution and Kmail) have built-in features that allow them to interact with GPG. To enable encryption in Mozilla Thunderbird, you must install Enigmail.
If you are using Evolution, you should compose your message as you normally would and then select PGP Encrypt from the Security menu in the message composition window. Once you do this, Evolution will query the keyservers. If Evolution is able to find a key that matches the email address of the recipient, your message will be automatically encrypted as it is sent.
Kmail and Thunderbird handle encryption in much the same way. Unlike Evolution, Kmail or Thunderbird will not automatically query the keyservers to match the recipient email address with, but will only allow you to use the public keys you have installed on your computer. After you have chosen a key, the message will be encrypted with it and sent. While this encryption process is not as automated as Evolution’s, it does prevent the small possibility of automatically encrypting with an old or expired key that the recipient no longer uses.
Source: ERM Blog
Email Security: How to Send Encrypted Emails
Using GPG with popular email software
Many popular Linux email clients (Like Evolution and Kmail) have built-in features that allow them to interact with GPG. To enable encryption in Mozilla Thunderbird, you must install Enigmail.
If you are using Evolution, you should compose your message as you normally would and then select PGP Encrypt from the Security menu in the message composition window. Once you do this, Evolution will query the keyservers. If Evolution is able to find a key that matches the email address of the recipient, your message will be automatically encrypted as it is sent.
Kmail and Thunderbird handle encryption in much the same way. Unlike Evolution, Kmail or Thunderbird will not automatically query the keyservers to match the recipient email address with, but will only allow you to use the public keys you have installed on your computer. After you have chosen a key, the message will be encrypted with it and sent. While this encryption process is not as automated as Evolution’s, it does prevent the small possibility of automatically encrypting with an old or expired key that the recipient no longer uses.
Source: ERM Blog
Email Security: How to Send Encrypted Emails
Using GPG with popular email software
Many popular Linux email clients (Like Evolution and Kmail) have built-in features that allow them to interact with GPG. To enable encryption in Mozilla Thunderbird, you must install Enigmail.
If you are using Evolution, you should compose your message as you normally would and then select PGP Encrypt from the Security menu in the message composition window. Once you do this, Evolution will query the keyservers. If Evolution is able to find a key that matches the email address of the recipient, your message will be automatically encrypted as it is sent.
Kmail and Thunderbird handle encryption in much the same way. Unlike Evolution, Kmail or Thunderbird will not automatically query the keyservers to match the recipient email address with, but will only allow you to use the public keys you have installed on your computer. After you have chosen a key, the message will be encrypted with it and sent. While this encryption process is not as automated as Evolution’s, it does prevent the small possibility of automatically encrypting with an old or expired key that the recipient no longer uses.
Source: ERM Blog
Wednesday 4 February 2009
Malaysian broadband information
- Wimax - currently used by packet one(P1), YTLcomms, AMAX, REDtone
- HSPA - known as 3.5G, currently used by MAXIS, Celcom, DiGi, UMobile
- LTE - known as next generation of hspa by 3gpp, theoretically can up to 100Mbps download and 50Mbps upload.
- iBurst - currently used by izzi
Malaysian broadband information
- Wimax - currently used by packet one(P1), YTLcomms, AMAX, REDtone
- HSPA - known as 3.5G, currently used by MAXIS, Celcom, DiGi, UMobile
- LTE - known as next generation of hspa by 3gpp, theoretically can up to 100Mbps download and 50Mbps upload.
- iBurst - currently used by izzi
Malaysian broadband information
- Wimax - currently used by packet one(P1), YTLcomms, AMAX, REDtone
- HSPA - known as 3.5G, currently used by MAXIS, Celcom, DiGi, UMobile
- LTE - known as next generation of hspa by 3gpp, theoretically can up to 100Mbps download and 50Mbps upload.
- iBurst - currently used by izzi