After almost 20 years of using computers I have come to appreciate the importance of computer security. That irritating obligation you may feel to run an anti virus check on your system once a day just to feel more secure. The wish to eliminate those nagging spam emails permanently from your Inbox. And more recently those unsolicited requests to update your online banking information also known as phishing.
If you are like most people and want to avoid the loss of important information on your computer or laptop, I suggest your implement the following suggestions asap:
1. Respect Your Personal Privacy: Most people register for websites left right and centre. This is encouraged by people who invite all their friends to join the latest social networking websites. And with the proliferation of niche social networking websites this trend is set to continue. However, personal privacy is being ruined by simple behaviour like forwarding jokes or chain letters. Start to protect your email address and other personal information. If you’re just exploring a new website, register a free email address, and use that one to avoid receiving spam at some later date. When you send out emails to more than one person consider using BCC.
2. Install a Personal Firewall – One of the things I did for the first 8 years of my professional career is to install and maintain network firewalls. Personal firewalls are smaller versions of this same concept that protect your persoal computer or laptop. The purpose of the firewall is to prevent unsolicited attempts to hack your information. Cellphones do not have such a facilite just yet but will require one in the near future, especially those smartphones. As broadband explodes in South Africa, more and more people simply leave their computers permantely connected to the Internet. The risk of an attact on your computer is compounded so remember to switch it off. Even if you information is NOT valuable, your computer can potentially used as a gateway to cause problems for other people. And that will eventually come back to you causing more unecessary headaches. There are many pieces of remote scanning software and remote management software which allows you to take over a desktop seamlessly. I recommend ZoneAlarm or Sygate.
3. Anti-Virus: This is actually the most basic compontent of computer security because computer viruses have been around since the earliest days of the Internet. Once again Microsoft products are the main culprits period. So protect yourself using one of the following recommended free anti virus programs: PC Tools, ClamWin or AVG. It is important your anti-virus also checks your emails before sending and before receiving because today, this is the #1 method by which they spread.
4. Anti-Spyware: Spyware is similar to computer viruses but different. The prolifiration of spyware can directly be correlated to the rise of interactive websites, and to some extent ecommerce websites. These website primarly use files like cookies to track user behaviour across the Web. Besides being a invasion of personal privacy, sometimes small little applications are installed, with your permission, to give you certain functionality. I strongly advocate you turn your web browser settings to the highest privacy settings and it will go some way to reducing this problem. On the other hand you must run a weekly scan for spyware using one of the following software applications: Ad-Aware, Windows Defender,
5. Operating Systems updates: This is probably the most irritating part of maintaining good computer security. If you are running WindowsXP or Windows Vista you are downloading updates constantly. This not only uses bandwidth but over time adds so many layers on top of your existing installation that it reduces the time to boot your computer. Even if you are running Mac OS X or Ubuntu Linux, my favourite alternatives to Microsoft Windows, they both require weekly or at least monthly updates from the Internet. These updates fix security loopholes often discovered by white hat hackers or by ordinary users. Remember that software applications often update themselves on a regular basis as well and programs like Microsoft Outlook or Microsoft Office can be your archihilles heel, so consider moving to Open Office.
Thursday, December 10, 2009
5 Basic Step of Computer Security
Wednesday, August 05, 2009
Cadangan Mewujudkan Website Untuk ATMA/UPNM
Salam semua,
untuk pengetahuan saya dengan beberapa orang sahabat sedang dalam proses untuk mewujudkan website untuk semua intake ATMA/UPNM. Pembikinan website tersebut masih dalam peringkat pembinaan. Jika ada dikalangan tuan/puan sudi untuk menyumbang bolehler menghubungi saya. Sebagai permulaan saya akan menggunakan share hosting sebagai hosting untuk kita wujudkan website berkenaan. Saya juga memohon cadangan dari tuan/puan nama yang sesuai untuk domain yang akan digunakan nanti. Sebagai cadangan saya akan menggunakan nama domain seperti berikut http://www.siska.com.my atau http://www.siska.com . Jika tuan/puan mempunyai sebarang cadangan boleh ler maklumkan kepada saya. Dengan wujudnya website tersebut, diharap dapat mengeratkan lagi semangat kekitaan di kalangan siswa/kadet ATMA/UPNM.Hope So.....
Monday, January 05, 2009
Cara Conf modem db102 ADSL
Cara untuk memudahkan kita access streamyx dengan tidak perlu login. Caranya adalah seperti dibawah:
Click on WAN at the top, then select PPP on the left side. It should be written "No PPP Interface Entry!". If there is a PPP interface inside, just delete all of it off. Click on the Add button at the bottom.
Leave everything as default except the ones mentioned below.
Status : Start
Protocol : PPPoE
Use DHCP : Disable
Use DNS : Enable
Default Route : Enable
Numbered If-Name : None
Then key in your username and password into the field. Then click Submit. After that, click Admin on the top right side. Click on Commit followed by the Reboot button. Once the Link light is stable, it should automatically connect to Streamyx for you.
Tuesday, December 30, 2008
WiMAX vs 3G
Di Malaysia, 3G digunakan sebagai teras perhubungan dan lebih diterima kehadirannya berbanding WiMAX kerana ia masih terlalu baru. Mengapa masih tiada keterbukaan pengguna mengenai WiMAX? Adakah 3G lebih hebat atau pengguna belum memahami konsep WiMAX yang dianggap setara atau lebih berteknologi tinggi?
Teknologi generasi pertama (1G) dibangunkan akhir 1970 dan berterusan sehingga 1980-an. Manakala 2G pula dimulakan pada 1990, dibangunkan menerusi teknologi CDMA dan Sistem Global untuk Komunikasi Mudah Alih (GSM).
Seterusnya, peningkatan teknologi diteruskan dengan kewujudan 2.5G atau dikenali sebagai rangkaian Data yang Dipertingkatkan untuk Evolosi GSM iaitu perkembangan rangkaian Perkhidmatan Radio Berpaket Am (GPRS) yang diperkenalkan kepada pengguna telefon bimbit menerusi sistem GSM.
Manakala, 3G adalah rangkaian generasi ketiga berdasarkan standard Persatuan Telekomunikasi Antarabangsa (ITU) yang digunakan di bawah IMT-2000.
Ia dianggap permulaan ke arah komunikasi tanpa wayar sama ada di talian tetap atau mudah alih. Rangkaian boleh diakses daripada pelbagai lokasi selagi ada liputan yang disediakan rangkaian 3G terbabit.
3G tidak memonopoli penggunaan suara semata-mata bahkan ia dicipta untuk komunikasi data bagi membolehkan pengguna menerima perkhidmatan rangkaian yang lebih luas seperti persidangan video, data jalur lebar tanpa wayar yang dibuat menerusi telefon bimbit.
WiMAX (Kebolehoperasian Sedunia bagi Capaian Gelombang Mikro) adalah teknologi telekomunikasi untuk mengakses Internet menerusi jaringan jalur lebar mudah alih tanpa wayar yang menghasilkan kelajuan melebihi 2 Megabit sesaat (Mbps).
Teknologi ini berdasarkan standard IEEE 802.16d untuk WiMAX talian tetap manakala 802.16e dikenali sebagai WiMAX mudah alih.
Ia dianggap teknologi baru yang mampu menguasai peralihan teknologi maklumat (IT) bukan sahaja di Malaysia malah di seluruh dunia. WiMAX berpotensi untuk membina pasaran baru, mengubah skop Internet dan sebagai revolusi perubahan jaringan telefon bimbit.
Jika dilihat evolusi 3G dan WiMAX, 3G menerusi telefon bimbit lebih fokus kepada teknologi suara berbanding WiMAX 10 kali ganda kepada perkembangan teknologi data.
Oleh itu, 3G vs WiMAX boleh diumpamakan seperti suara vs data. Hakikatnya, kedua-dua teknologi ini saling melengkapi kekurangan masing-masing. Secara konsepnya, WiMAX direka sebagai laluan untuk pengguna mengakses Internet dan bukannya menggantikan rangkaian telefon sedia ada.
Namun, kewujudan WiMAX yang mempunyai Internet Protocol (IP), menyokong kekuatan Quality of Service (QoS) dan keselamatan, WiMAX dianggap sebagai platform yang cemerlang untuk mengendalikan inovasi Suara menerusi Protokol Internet (VoIP).
Apabila WiMAX digabungkan dengan VoIP, ia boleh menjadi alternatif kepada teknologi 3G di telefon kerana dianggap berkesan menerusi lebar lajur, talian dan memudahkan perbualan suara sebagai aplikasi terbaru. Disebabkan itu, WiMAX sering disalah erti sebagai teknologi yang bakal
mengubah rangkaian telefon.
Ternyata silap! WiMAX cuma memudahkan pengguna untuk mencapai rayauan Internet yang meluas walau di mana jua pengguna berada.
Ketua Pegawai Eksekutif Packet One Networks (M) Sdn Bhd (P1), Michael Lai, berkata Malaysia bakal mencapai sehingga 50 peratus perkembangan jalur lebar pada tahun 2010. "Selaras itu, pada Ogos lalu, P1 yang melancarkan P1 WiMAX, menjadi peneraju utama perkhidmatan WiMAX di Malaysia dan perkhidmatan pertama di Asia Tenggara.
"P1 juga diiktiraf sebagai penyedia rangkaian WiMAX yang pertama menggunakan spektrum 2.3GHz di dunia," katanya.
Beliau berkata, perkembangan jalur lebar di Malaysia hanya tujuh peratus manakala perkembangan telefon bimbit melebihi 80 peratus.
"Terdapat dua perkembangan masa kini yang memberi cabaran kepada P1 iaitu telefon bimbit dan jalur lebar.
"Bayangkan pergerakan kita hari ini tanpa telefon bimbit? Bagaimana pula jika dahulunya kita menolak menggunakan telefon bimbit dan hari ini kita tidak boleh hidup tanpanya? Senario ini sama seperti jalur lebar yang ketika ini menjadi keperluan pada setiap pengguna.
"WiMAX dibangunkan untuk data, Internet dan jalur lebar yang kini menuju ke jalur lebar tanpa wayar iaitu hanya menggunakan modem USB tanpa wayar," katanya.
Menurutnya, WiMAX dan 3G tidak boleh dibuat perbandingan kerana kedua-dua teknologi ini memainkan peranannya yang tersendiri dan sentiasa berubah untuk mencapai tahap teknologi yang lebih tinggi.
Pengurus Negara Nokia Siemens Network Malaysia, Bill Chang, berkata Nokia Siemens Networks (NSN) yang berkeyakinan terhadap GSM - 3G, 3.5G, LTE juga sepertimana WiMAX dan teknologi lain memastikan Malaysia mempunyai pilihan untuk merealisasi dan mengguna pakai teknologi tertentu yang bersesuaian dengan kemahuan dan keperluan untuk jangka masa pendek dan akan datang.
"WiMAX dianggap pelengkap kepada 3G, DSL dan teknologi jalur lebar lain sejajar dengan pelan MyICMS886. Ia membantu peningkatan jalur lebar, terutama yang berkaitan dengan penggunaan kabel tembaga dan dilihat sebagai antara teknologi yang meringankan pengasingan kos.
"Sebagai contoh, pembangunan Village Connection dan Internet Village adalah jalan penyelesaian daripada NSN, berperanan dengan menyatukan inovatif dan perniagaan yang fleksibel, seperti mengurangkan kos peralatan untuk membolehkan peningkatan pasaran, membolehkan ia bergabung dengan komuniti, Internet dan seluruh dunia," katanya.
Tiga faktor penyelesaian untuk 'siapa menang' dan mengapa?
*Modul enkripsi vs kad SIM (Modul Identiti Pelanggan)*
Set cip WiMAX diperluaskan dengan murah untuk kegunaan komputer riba, netbook, telefon dan peralatan pengguna berasaskan elektronik. Teknologi seperti HSPA tidak mampu dibandingkan kerana satu perkara: kad SIM. Peralatan yang dihubungkan kepada rangkaian telefon perlu mempunyai kad SIM fizikal. Kombinasi rangkaian cip telefon dan kad SIM adalah lebih mahal berbanding cip WiMAX.
WiMAX menggunakan modul enkripsi perisian yang ternyata lebih fleksibel, mudah ditatarajah dan diskalakan. Jika WiMAX mampu bergerak di pelbagai peralatan elektronik pengguna, ini menunjukkan WiMAX lebih berkuasa berbanding 3G. Walaupun 3G mampu menggerakkan kad SIMnya sebagai penyelesaian perisian namun ia tetap mengambil masa yang bertahun untuk
mengubah pendekatannya.
Pencapaian Sebenar
Ketika kebanyakan syarikat memperdagangkan talian 3G serta membandingkan kelajuan HSPAnya sama dengan WiMAX, tidak semestinya pelaksanaan kedua-duanya sama. WiMAX bertunjangkan IP, mempunyai topologi rangkaian yang lebih mudah maka ia sepatutnya mempunyai spektrum yang lebih berkesan dan laju.
Pandangan dan Kemahuan Pengguna
Rangkaian telefon dianggap tidak meyakinkan pengguna tentang teknologi tanpa wayar yang mampu memberi pengalaman Internet di rumah ke telefon bimbit. Kebanyakan telefon bimbit mempunyai perisian Bluetooth dan digunakan untuk mesej dan melayari Internet secara asas. Senario ini menganggap telefon bimbit 3G menjadi lebih mudah berbanding DSL atau kabel modem.
WiMAX mampu mengatasi hal ini sekiranya dapat mengaplikasikan sambungan Internet di telefon bimbit dengan Fixed WiMAX, di mana pengguna mempunyai akses 10 Mbps di rumah/pejabat dan boleh dicapai melalui telefon bimbit dengan 2 Mbps.
Perkara utama persaingan Internet antara WiMAX dan 3G ialah, dunia perniagaan masa kini menggunakan teknologi yang lebih pantas dan peka. Oleh itu, lebih ramai pengguna hari ini memilih WiMAX yang banyak digunakan oleh peniaga kecil dan sederhana (PKS) serta pengusaha berbanding 3G hanya menawarkan perkhidmatan untuk jangka pendek.
Kesimpulannya, WiMAX dan 3G meletakkan kedua-dua pengusaha rangkaian ini sentiasa bersaing antara satu sama lain, seperti NSN dan P1.
Tidak perlu mempersoalkan syarikat mana yang lebih untung kerana objektifnya penciptaan teknologi baru ini adalah untuk memberi kemudahan kepada pengguna.
Ketika ini juga sudah muncul teknologi 3.5G (HSDPA) dengan keupayaan sehingga 3.6 Mbps yang mampu dimiliki pengguna menerusi tawaran daripada penyedia rangkaian telekomunikasi di Malaysia seperti Celcom yang menawarkan perkhidmatan jalur lebar dengan harga serendah RM98 sebulan bagi langganan 3.5G.
Tuesday, November 25, 2008
Rahsia Untuk Memperolehi Duit dengan Adsense
Assalamualaikum.
Saudara dan saudari sekalian. Saya mempunyai e-book yang mengandungi rahsia untuk memperolehi pendapatan dengan google adsense. E-book tersebut ditulis dalam bahasa melayu. Jadi jika ada yang berminat. Boleh menghubungi saya di alamat subbiri@gmail.com . Bayaran untuk e-book tersebut sangat murah dan boleh dimiliki oleh semua orang. Harganya dengan saya cuma RM 5 sahaja. Jika berminat saudara-saudari semua boleh menghubungi saya dan segala transaksi menggunakan akaun maybank. Harap maklum.
Video Nordin Montong
Video ini aku dapat dari laman web. Video yang memaparkan saat-saat akhir Nordin Montong yang maut di baham oleh 3 ekor harimau putih di Zoo Singapura baru-baru ini. Video ini boleh di dapati di sini.
Wednesday, November 19, 2008
4 Minutes of Terror (Nordin Montong)
![]() | ||
![]() | ||
They had seen a man in the enclosure belonging to three white tigers. It's just an animal act, thought Nizam Zainal and his six friends. Who in their right mind would jump into an enclosure with three wild tigers, armed with nothing but a pail and a broomstick? So Nizam continued filming at the White Tiger exhibit with his video camera. His group of friends were all prepared for a relaxing day at the zoo, despite the cold, drizzly weather. All of them had just completed their O-level examinations and had been looking forward to this break. It was a slow day at the zoo. Small pockets of tourists were strolling around. It was a weekday. And the weather was dreary. SUDDENLY, HE HEARD A LOUD SPLASH. The 16-year-old swung his video camera around and was surprised to see Mr Nordin Montong, 32, wading in the water. 'I turned and saw a man in the water, walking slowly with both his arms outstretched, with a pail and a broom in each hand. 'The man looked very calm and was shouting at the tigers, trying to attract their attention.' It must be a zoo-keeper who was familiar with the tiger exhibit, he thought, still calm. Tiger approaches One of the tigers, clearly excited by the splash, sprinted towards the water to investigate the disturbance. Mr Nordin coolly emerged from the water and walked up a stone ledge, coming face-to-face with the still calm but curious and waiting tiger. Nizam thought for a moment that the tiger was familiar with Mr Nordin and had gone to welcome him. PERHAPS THE TIGER WAS BEGGING FOR A SNACK, thought Nizam. But the tiger suddenly swiped at Mr Nordin, to the horror of the 20-strong gawking, frightened crowd at the enclosure. The blows brought Mr Nordin to his knees. The huge cat then sank its teeth into the back of Mr Nordin's neck and tossed him around repeatedly like a ragdoll. Then the second tiger crawled up the ledge. Both tigers started to sniff at and circle Mr Nordin. Nizam's friend, Fadzil Ramlee, also 16, shouted repeatedly to Mr Nordin: 'Dude, get into the water!' Fadzil told The New Paper later. 'When he was being attacked, some people started screaming and shouting at him to get into the water. 'We also shouted at the tigers to distract them. One tourist threw his umbrella at the tigers but missed.' His hands trembling, Fadzil continued shooting with his video camera, somewhat mesmerised by the vicious attack unfolding before his eyes. Mr Nordin was then curled up on the stone ledge. He used the pail to cover his head. The two tigers stood over him. Then they circled him, sniffed him - and began swiping at him repeatedly with their huge paws. The tigers seemed distracted by the crowd's shouts and whistles, but they never left Mr Nordin's side. This lasted a good two minutes. The crowd swelled to more than 30 people, including some of the zoo's staff. One zookeeper tried to distract the tigers by using a long stick to hit the water. Nizam said he didn't see any zoo staff armed with rifles. Just when the crowd thought the tigers were distracted enough for Mr Nordin to be safe, one tiger suddenly grabbed him by the back of his neck and dragged him further into the enclosure. The crowd screamed even louder at the two tigers, both in shock and horror, and in a desperate bid to distract the tigers. The two tigers looked away, momentarily distracted by the crowd. Mr Nordin stood up but was quickly brought down again by the tigers. One tiger started to bite Mr Nordin on his back repeatedly. The crowd cringed in horror. Blood could be seen streaming from the wounds on his back. The tiger's mouth was also bloody. Mr Nordin was struggling and thrashing his legs about. Then he became still. That was Nizam's last glimpse of Mr Nordin. Just before the four-minute clip ended, a third tiger emerge from the bushes. Nizam and his friends were by then literally trembling. Nizam could no longer hold the camera steady. They were ushered quickly out of the enclosure by the zoo-keepers, who then cordoned off the area. The group remained quiet after that, traumatised by what they saw and captured on video. Said Nizam: 'I didn't expect to shoot something so terrifying. It was so unreal.' He said that his hand was shaking while he was shooting the entire scene, but for some reason, he couldn't put down the camera. He said: 'It was emotional but I just couldn't put down the camera.' The $1,100 video camera belongs to his father. He said that he saw one girl crying, and holding on to her boyfriend while being led out of the enclosure. The group continued their tour of the zoo, and returned to the enclosure about three hours later. It was then that they learnt that the man had died from his injuries. Said Fadzil: 'All of us thought that maybe the man was rescued and had only slight injuries. 'It's a terrible way to die.' This article was first published in The New Paper on November 14, 2008. |