Wednesday, January 26, 2011

Security Threats

a). Social Engineering
It is the act of obtaining or attempting to obtain secure data by leading an individual into revealing secure information. Social Engineering is successful because its victims will reveal their information to someone whom pretended to be someone they trust or representing to be someone they trust. The victims of social engineering are tricked into releasing information that they do not realize will be used to attack a computer network.

b). Salami Slicing
A technique which successfully used by criminal IT staff to acquire a large sums of money, by collecting a very small amounts. It is mostly applied on Foreign Exchange business where a large amount of transaction will takes part. Salami Slicing will round down the amount and transfer the small amount of money to different and hidden account. This approach can only work well with systems that handling a huge numbers of transactions and where the amount will not be noticed.

c). Trojan Horse
A software that masquerades as a positive application. Trojan Horses do not duplicate themselves but can be destructive. Trojan Horse is a program that claims to rid your computer viruses, but in other hand, they are actually introducing viruses onto your computer.

d). Distributed Denial of Service
A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. A hacker begins by exploiting a vulnerability in one computer system and making it the DDoS master. It is from the master system that the intruder communicates with other systems that can be compromised. The intruder loads cracking tools available on the internet on several compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. This is how the denial of service caused.

e). Sniffer
A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunneled) packets can be broken open and read unless they are encrypted and the attacker does not have access to the key. Using a sniffer, an attacker can analyze your network and gain information to eventually cause your network to crash or to become corrupted. Besides, it will also read the communication between you and your receiver.

f). IP Spoofing
Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet. After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. The attacker can also conduct other types of attacks, as described in the following sections.

g).Brute Force Attack
A brute force attack consists of trying every possible code, combination, or password until you find the right one.

The difficulty of a brute force attack depends on several factors, such as:

  • How long can the key be?
  • How many possible values can each component of the key have?
  • How long will it take to attempt each key?
  • Is there a mechanism which will lock the attacker out after a number of failed attempts?

As an example, imagine a system which only allows 4 digit PIN codes. This means that there are a maximum of 10,000 possible PIN combinations.

h). Shoulder Surfing

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand.

i). Sabotage

Employees are most familiar with their employer's computers and applications, including knowing what actions might cause the most damage, mischief, or sabotage. The downsizing of organizations in both the public and private sectors has created a group of individuals with organizational knowledge, who may retain potential system access (e.g., if system accounts are not deleted in a timely manner). The number of incidents of employee sabotage is believed to be much smaller than the instances of theft, but the cost of such incidents can be quite high.

Common examples of computer-related employee sabotage include:

  • destroying hardware or facilities,
  • planting logic bombs that destroy
  • programs or data,
  • entering data incorrectly,
  • "crashing" systems,
  • deleting data,
  • holding data hostage, and
  • changing data
j). Electromagnetic Interference
Electromagnetic Interference (or EMI, also called Radio Frequency Interference or RFI) is a disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source. The disturbance may interrupt, obstruct, or otherwise degrade or limit the effective performance of the circuit. The source may be any object, artificial or natural, that carries rapidly changing electrical currents, such as an electrical circuit, the Sun or the Northern Lights.

Wednesday, December 22, 2010

Nike Lab Tutorial

a). ERP system is a computer-based application that used to manage both internal and external resources, such as tangible assests, human resource, meterials, and financial resource. As Nike is headquartered in United State and has offices located in 45 countries outside of United State, so, using ERP system is convenient for those offices to communicate and share information with the headquarter. ERP system built up on a centralized database which enables these offices to operate uniformly and world widely, sharing on the same database. SCM system is a management of a network interconnected business. So, as Nike has so many offices world widely, SCM helps in managing all the movements, storage of raw-materials, work-in-process inventory, and finished goods from point of origin to point of consumption. From design to planning, execution, control, until monitoring every activities from different offices can be done using SCM system.

b). MRP2 benefits Nike as it is a method for an effective planning for the company. It involves of financial planning, business planning, better control of inventories, productive relationship with customers, and quality control. MRP2 concern about the entire manufacturing production, including materials, finance, and human resource. It helps in providing details or data to every participants in the manufacturing process. With all these involvements of MRP2, Nike can provides a better production and better relationship between them with their suppliers and customers. When it comes to ordering and tracking, MRP2 plays an important role as all the ordering details between Nike and the suppliers are recoded, and it brings advantages when it comes to tracking purpose.

c). CRM is a widely-implemented strategy for managing a company's interaction with customers, clients, and sale prospects. The purpose of CRM is to find, attract, and win new clients, remain the existing clients the company has, looks for former clients back to the company, and reduce the cost of marketing and client service. Nike needs the help of CRM to remain its clients from the world wide, and attract new clients. Customer extension, to attract its clients to buy more or additional when they purchased the products that they're looking for initially. Products like the clients may need when they have the one they've just bought, jusr to reach the perfection, and etc. It is a key to the profits earning.

Tuesday, December 21, 2010

Apartment for sale


Looking for an apartment in Flora Damansara? Here you go with the selling price of RM71 000.

Built Up: 650 square feet
3 rooms
2 toilets
22nd floor
Small Balcony
Block A
Facing LDP Highway and Water Fall (Nice and relaxing view)


Surau, mini market, cyber cafe, restaurants are around that area.
Stones away from Elit Mutiara Damansara, Police Station, IKEA, Tesco Mutiara Damansara ( 7 minutes ), Courts Mammoth, Harvey Norman, Cineleisure.

For those who are interested, please contact 012-3456789

Tag Heuer Aquaracer watch


The Tag Heuer Aquaracer watch concept is founded on providing the accuracy that all water sports demand. The Aquaracer men's watch WAJ2111.FT6015 is an all stainless steel case and rubber bracelet watch complimented with a Fold over Clasp with Flip Lock & Push Button. Tag Heuer men's wristwatch WAJ2111.FT6015 has a scratch resistant sapphire crystal surrounding its patterned silver dial showcasing luminescent hands and the beneficial date feature. Tag Heuer Aquaracer WAJ2111.FT6015 has a screw-down crown and Skeleton case back for a water resistance level up to five hundred meters making this watch suitable as an everyday accessory as well as diving. Founded in 1860 by Edouard Heuer, the TAG Heuer Watch Company has established itself as a leading producer of prestigious sports watches and chronographs. Precise standards and enduring reliability make the TAG Heuer name unparalleled in the watch industry. Accordingly, TAG Heuer watches have timed major sporting events internationally since the early 1900's.
Get it now at only RM6970.



Garmin GPS Navigator

Did you face any problems in finding a way out when you're lost in some where else? Grab yourself a Garmin nüvi GPS navigator to lead you the right way to the destination. Garmin GPS navigator is a personal travel assistant featuring voice-activated navigation and lane assist with junction view. Navigate with confidence while nüvi directs you to the preferred lane while driving. Also, see realistic images of upcoming junctions where available. It features voice-activated navigation, a widescreen display, preloaded maps, an FM transmitter and more. Sleek, ultra-slim design fits in a pocket is convenient for you to carry it everywhere. High-sensitivity GPS receiver for fast satellite lock helps you get the way without any failure. Grab yourself a Garmin GPS with only RM700 now!


Wednesday, December 15, 2010

Smart Phone Cases

Smart phones have became part of us nowadays. People prefer to own a smart phone instead of a normal phone, for the sake of entertainment, connectivity, curing boredom and etc. A smart phone may cost more than a normal phone. So, having a good quality of casing for their smart phone has became a must for those smart phone owner. This is a site for those smart phone owners to spot for a suitable and quality casing. Prices are reasonable as well.



Code: 18329
Type of phone: BlackBerry Curve
  • Protect your BlackBerry Curve and its camera from bumps and scratches.
  • Proximity-sensing technology:
    • Saves power and maximizes battery life by automatically shutting off the screen
    • Can activate different notification settings for incoming calls, emails and other functions based on in-holster and out-of-holster profiles
  • Luxurious and durable exterior
  • Built-in thumb groove makes removing the smartphone from the holster effortless
Price: RM68



Code: 25036
Type of phone: HTC Wildfire Pouch
  • made from high durable leather and soft internal lining
  • built in pull strap for easy and convenient removal
  • Leather strap to stop your phone falling out of the case
  • Provides protection yet access to headphone socket and power keys
  • Prevents accidental screen presses and damage to the screen from coin's and keys
Price: RM72


Code: 25692
Type of phone: Samsung Galaxy S
  • Extremely slim profile
  • Impact resistant, flexible plastic shell
  • Made for Samsung Galaxy S
  • Screen protection kit included
Price: RM75