Sunday 17 June 2012

TIPS TO REDUCE SPAM - PART 2

As in Part 1, I already explained the definition of Spam and how to distinguish Spam.

In this posting, I will details how to reduce Spam.

  1. Don't reply to Spam - many spammers will put 'unsubscribe' function into their e-mails. By responding, users are actually verifying that the user's account is active. This can deluge the users for the spam mails.
  2. Don't open Spam - some spam messages are programmed to contain web bugs, which notify the senders when an e-mails has been opened. The notification is a positive sign to spammers that the users e-mails is valid.
  3. Never used 'remove' options in a Spam - because using the 'remove' option is same as replying to a spam.
  4. Never buy anything advertised in Spam - Spammers exists when there are people purchase what the spammers peddle in the e-mails. By not purchasing the advertised in spam, the spam might be stopped.
  5. Don't publicly disclose your e-mail address - Only give out your e-mails address where there is justifiable need.
  6. Use Spam filters - Using protective software is one of the most effective ways to control spam because filters will allow the e-mail's user to block any e-mails messages from specified address, domains or which have a specific subject or text from being deposited to the e-mail box.
(Source mainly from SKMM)

HANDLING SPAM IN E-MAILS - PART 1

Assalamualaikum and Selamat Sejahtera

Today I would like to touch about Spam in e-mails. As an e-mails users, there are no doubts that everybody has been experienced when received Spams in their e-mails. For sure, these Spams is really frustrating to the users.

What is Spam?
Spam is defined as mass sending of unsolicited or unwanted message either to our e-mails or nowadays into our mobile phone. Normally, spam is using for spreading viruses, but there also spam for marketing and create publicity for products and services.

Therefore, spam will create less confidence to the e-mail users toward e-mail usage. By the way, for e-mail service provider, spam will increase their cost due to impose more storage, transmission and computing costs.

The only way to distinguish between legitimate message and spam is consent. If you asked for that information, it is not spam. For instance, an e-mail from friends is not spam.

There are several ways how the spammers get e-mail address. Firstly by using automatic programs or 'harvesters' to scan newsgroup, webpages and forwarded e-mails. Secondly by purchasing lists of e-mails from third parties and lastly by using 'dictionary attack' in order to try out all possible combinations of letters, common names and words in e-mail address.

Thanks you.

In next posting, I will details tips to reduce Spam. (Main source from SKMM)




Friday 15 June 2012

RESALE OF DOMAIN NAMES

This summary is not available. Please click here to view the post.

DOMAIN NAMES/INTERNET ADDRESS COORDINATION

Who coordinate and set address or what we called as Domain Names in the internet?

The agency that coordinate the internet address or Domain Names is Internet Corporation for Assigned Names and Numbers (ICANN).

The Domain Names must be unique either as a name or a number compare to the others because the computer will know where to find each other. Therefore ICANN coordinates these unique identifiers across the world so the internet will become global.

ICANN coordinates the Domain Name System (DNS), Internet Protocol (IP) address, space allocation, protocol identifier assignment, generic Top Level Domain (gTLD), and country code Top Level Domain (ccTLD) name system management and root server system management functions.

These services were originally performed under U.S Government contract by the Internet Assigned Number Authority (IANA). ICANN now performs the IANA function.

Meanwhile, the Internet Assigned Numbers Authority (IANA) is a department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly. Whilst the Internet is renowned for being a worldwide network free from central coordination, there is a technical need for some key parts of the Internet to be globally coordinated – and this coordination role is undertaken by IANA.

Specifically, IANA allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet. IANA’s various activities can be broadly grouped in to three categories:
  • Domain Names
    IANA manages the DNS root, the .int and .arpa domains, and an IDN practices resource.
  • Number Resources
    IANA coordinates the global pool of IP and AS numbers, providing them to Regional Internet Registries.
  • Protocol Assignment
    Internet protocols’ numbering systems are managed by IANA in conjunction with standards bodies.
IANA is one of the Internet's oldest institutions, with its activities dating back to the 1970s. Today it is a set of services provided by ICANN, an internationally-organised non-profit organisation set up by the Internet community to help coordinate IANA's areas of responsibilities. (Sources from ICANN and IANA)

Wednesday 6 June 2012

MY FIRST EXPERIENCE IN COMPUTER WORLD


My first experience in ICT, 1992
When I was in Form 1 in the year of 1992 at my secondary school at Sekolah Menengah Kebangsaan Datuk Abdullah (SEMENDA), Astana Raja, Negri Sembilan, I was introduced to the computer world. During that time, my computer class will be held at night by one of the teacher's namely as Cikgu Fairus. He also acted as a hostel warden.

As a kampung boy, the computer is totally new things to me. At that time also, computer still new to the Malaysia education system. I still remember that when I back home normally at the end of every month, several computer literacy program was introduced maybe by the Felda Palong 6 administration to the peoples.

I was excited because during that class, I normally will enjoy to play computer game. The first lesson in that class is about BASIC language and we in the class learned how to instruct the computer using BASIC language to print something as a end product.

Actually BASIC language is an acronym from Beginner's All-purpose Symbolic Instruction Code.

My computer lesson certificate dated in 1993
The original BASIC language was designed in 1964 by John Kemeny and Thomas Kurtz and implemented by a team of Dartmouth students under their direction. BASIC was designed to allow students to write programs for the Darthmouth Time-Sharing System. It was intended specifically for the new class of users that time-sharing systems allowed. It was also design for a less technical user who did not have the mathematical background of the more traditional users and was not interested in acquiring it.
BASIC remains popular in numerous dialects and new languages influenced by BASIC such as Microsoft Visual Basic. In 2006, 59% of developers for the .NET Framework used Visual Basic .NET as their only programming language. (Source from Wikipedia)

VIDEO SURVEILLANCE IN PUBLIC SPACES (PART 3)

Types of cameras in Video Surveillance:
Outdoor camera
Dome camera

Types of Camera
Function

Indoor Camera

Indoor camera is used for indoor security mechanism. Depending upon user security needs, the users can mount it at any suitable location inside the building. Suitable for security in location where indoor surveillance is required such as homes, schools, offices and hotels.
Outdoor camera
Outdoor CCTV camera is used for the outdoor such as entry and exit points with limited night lighting. Outdoor cameras typically have hard shell vandal-proof casings and a variety of lens options.
Infra Red (IR) Day/Night Camera
IR type of camera is used for high alert security areas for day and night surveillance. In the daytime, the cameras functions like a normal camera with standard colours, but at night, it switches to ‘low-lux’ black and white mode. When visibility decreases due to no-light situation, IR LEDs automatically imposed. Normally used in military activities and in parking lots.
Dome Camera
Dome cameras are installed inside a dark dome offering compacts design for a discreet appearance. These cameras can also be rotated and tilted manually. Dome type cameras are used in public areas like railway stations, bus terminals and other arrears with huge gathering of people.
Bullet Camera
Bullet cameras encased in bullet shaped housing are used in residential places as well as commercial places. They are small in size, with integrated design and offer illuminate viewing even in darkness and are weatherproof.
Vandal Proof Camera
Vandal proof cameras are used for outdoor security which sheltered within solid material and covered by a break-proof glass. These cameras are difficult to break, rain and fog resistant making them suitable for high security and normally placed at wall or ceiling mounted.
Hidden Camera
Hidden cameras are compact in size and used for secret monitoring. It’s has a built-in recorder that records and broadcasts simultaneously. They are usually installed in public places like department stores, theaters and clubs.
Pan Tilt Zoom Camera
Pan-tilt-zoom Camera offers the ability to view and zoom in all directions. One can even set the camera to automatically rotate to different fields of vision.
(Source: SKMM)

VIDEO SURVEILLANCE IN PUBLIC SPACES (PART 2)


The use of video surveillance is getting vital and important especially in crime prevention tool used by both in public and private sector. For instants, larger metropolitan areas such as London and Perth are equipped with video surveillance since early 1980s and the 1990s. However, the implementation of video surveillance in Malaysia considered as relatively new with prevalent developments only in the last five years.

Indoor camera
Video Surveillance can be defined as an activity using a video appliance that enables image capture of video images or extract information to be compressed, stored and transmitted over communication network and digital data link. Its also used to monitor, observe and analyze a person, a group and activities or even objects using surveillance camera.

CCTV is short for Closed Circuit Television is often highlighted since CCTV is one of the earliest and most well-known forms of video surveillance since its availability in 1960s. CCTV is a television transmission system where live or pre-recorded signal are sent over a closed loop to a finite and predetermined group of receivers, a monitor, sets of monitors or video recorder, either via coaxial cable, television wires, fiber-optic, microwave radio systems, internet or communication satellite. (This definition source from Sci-Tech Encyclopedia, Answers.com, VideoSurveillanceGuide.com)

However, implementing a video surveillance systems in public spaces must be done with integrity and respect for personal privacy and civil liberties. Other consideration and issues are recording of workplace surveillance as cameras installed at public spaces indirectly record the activities of on-street workers and cleaners, the potential risk of liability incurred in the responsibility of ensuring public safety within CCTV areas and the limitation of disclosure of video recording and images to other parties. (Source from SKMM)

Note: Due to the length of this article, types of surveillance cameras will be published in Part 3.

VIDEO SURVEILLANCE IN PUBLIC SPACES (PART 1)


CCTV in SUK Perak
One of the ICT's benefits to the consumers or to the citizens is the usage of the Video Surveillance, or what people always mentioned as CCTV. This article was taken from the Malaysian Communication and Multimedia Commission (SKMM) report's.

Crime incidents that have taken place around the world have changed government's orientation and spending towards security measures and solutions in the country. By 2012, the worldwide video surveillance industry market revenue is expected to grow to USD12.72 billion, with Asia Pacific accounting for almost a third of the market at USD3.59 billion.

CCTV for deterrence
In Malaysia, the Cabinet Paper of The Implementation of Program Bandar Selamat (Safe City Program)  was submitted to the Cabinets of Malaysia in July 14, 2004 which consist of three (3) strategies and 23 prevention method. One of them is the usage of CCTV especially in the 'hot area' of crime rate.

In a video surveillance system, a Closed Circuit Television or widely known as CCTV is the most commonly used equipment in recording surveillance activities together with Digital Video Recorders (DVRs). But lately, the market trend start using the:

  1. CCTV cameras and digital products are gradually converting to Internet Protocol (IP) cameras and networked;
  2. Cameras are using Network Video Recordings (NVRs) as opposed to full DVRs and going IP based;
  3. Smart and intelligent applications usch as Video Contents Analytic Software are being used; and
  4. Storage technology has improved in term of capacity and scalability through the development of Storage Area Networks (SANs)
There are several anticipated results from using Video Surveillance Cameras which are:

  1. Deterrence where installing surveillance cameras can discourage potential offenders
  2. Create efficiency in security deployment such as police department and the others authorities whereby they can gauge if police assistance is required thus avoiding false alarms incurring unnecessary police resources
  3. Develop self disciplining towards offenders and victims where potential victims are reminded of the risk of crime whereas offenders are disciplined through fear of being watched
  4. Detection where video recordings of crimes and offenses can be used to punish, remove offenders or used as evidence in court.
In PART 2, I shall explained the several types of cameras used in surveillance today.

Thanks you.