By now, you either know someone that’s been a victim of nasty malware or have yourself been on the business end of nefarious software. The perpetual duel between security companies and malicious elements in cyberspace has changed dramatically over time, and no change has been so dramatic as the rise of a new type of threat, a threat we call…ransomware!! …but what is Ransomware...
Is Uni-tasking underrated?
Google reported that 91 per cent of its Malaysian respondents are “multi-screening” with their smartphones, meaning that while watching TV, or working a laptop, Malaysians were at the VERY SAME TIME, using their phones. The Malay Mail reported this as Malaysians being champion multi-taskers, but I look at it as a negative, and instead view it as indication of just how easily distracted we are...
Internet connections speeds in Malaysia
Not to beat a dead horse now, (you can read my previous articles here and here)but I’ll say it one last time, internet speeds aren’t exactly what we should be debating over these days. We should focus on internet penetration rates, and broadband penetration, and define these correctly. The MCMC defines broadband as anything over dial-up. Which is stupid, because a 128kbps ISDN would...
Hacking Government, Malaysian Style
The simplest definition of a hacker, is someone who breaks systems. We tend to equate systems to computers, but that’s a limited definition of the term. A system can also refer to a legal system or a set of processes that have nothing to do with technology. For example, lawyers often hack around the law, looking for loopholes to exploit to give them an advantage in their case. A good lawyer...
How corporations lie to the technologically challenged
Two weeks ago, Lowyat.net published a ‘challenge’ to their readers, one that would supposedly pay a cool RM100,000 to the winner.All you had to do was decrypt an AES-256 encoded blob of code (more accurately referred to as ciphertext). As expected, no one won. Because breaking that ‘military-grade’ encryption is beyond the capability of most normal human beings, and...
Using the internet anonymously
While anonymity on the internet is slowly dying, there remain legitimate reasons for wanting to keep your online identity a secret from those meddling kids, governments or snooping criminals. From e-mailing leaked documents to commenting on blogs using pseudonyms or even just casual online chatting, utilizing the internet without leaving digital bread-crumbs behind you is a task that is getting...
Change WiFi password on Maxis home fiber router
Got Maxis Fiber to your home, but want to change your WiFi passwords, then here’s how you do it. First you need to logon to your router. You can do so by opening your Web-Browser and type (where you’d normally type google.com), or just click here. You should either see a picture like the above, then you’d need to enter the username and password, or if you haven’t setup a...
A dumb-pipe and Net Neutrality
The pipe that brings water into your home is a pretty un-sexy thing, just like the electrical cables that deliver electricity. Your internet connection though, has gotten sexier and sexier–from being used to deliver paid content like hyppTV and Astro to other more interesting services, resulting in a triple play (internet, tv and phone) of services, all piped into your home on a fibre optic...
Block This!!
A notice posted on the Malaysian Communications and Multimedia Commission’s (MCMC) Facebook page said the decision was made to block websites that “promote, spread information and encourage people to join the Bersih 4 demonstration“, on grounds that this will “threaten national stability”. I cannot then tell you to join Bersih and call for free and fair elections...
Why we fear ‘hackers’: Dangers of Technical Illiteracy
Are you afraid of Hackers? Do you lie restless at night thinking of what might happen if they got into your bank account, facebook profile, or e-mail. Perhaps you’re also worried about that they might hack into a forum you visit, or that they might get into your personal messages on whatsapp. It’s true that hackers are able to do all of these things, but the public perception of...