ArchiveAugust 2012

Answering the tough questions: Watson vs. Humans

A

IBM have always been on the cutting edge of innovation, they’ve moved more becoming merely a computer company to  what is probably the first truly all encompassing technology company, they don’t just make fancy gadgets or shiny tinga-ma-jigs, they make actual solutions for real-world problems. In 1996, IBM introduced the world to Deep Blue. Kasparov met Deep Blue and wasn’t...

Cracking Passwords with the Cloud

C

I  remember my computer security professor telling me that encryption doesn’t make it impossible to decrypt, but rather infeasible to decrypt. Nobody is going to buy a supercomputer to crack your final year thesis, simply because the data isn’t worth nearly as much as the cost to crack it–thereby making it infeasible. With cloud computing, however, end-users and regular joes...

Evidence Act Technological Misconceptions: A response to Rocky and Fatimah

E

The government has finally ‘relented’ and now wants to ‘discuss’ section 114A of the Evidence act 1950. Now it’s great because it proves beyond a shadow of a doubt that: 1. The internet can be used for fantastic good. 2. The general Malaysian public can make a difference in the governance of the country. My website also had the pop-up banner, and according to Google...

Maxis Fibre to the Home (FFTH) : Why you shouldn’t get it

M

Imagine buying a house from a housing developer who insist that even after you’ve bought the house the developer will be allowed access to your downstairs bathroom. So that even after you’ve bought the house and moved in and got that nice kitchen cabinet design you’ve been eye-ing, the developer can still access your downstairs bathroom, no matter what. Worse still, the...

How SSL works: A presentation on Slideshare

H

Slideshare.net is a great tool to share presentations on the web. Think of it as the youtube of powerpoint presentations. I was toying around with my preview version of Microsoft Office 2013, specifically Powerpoint 2013, and I thought I’d create a new powerpoint to illustrate what I described earlier this week about How SSL works. Hope you guys like the powerpoint presentation, I was just...

Google: Lazada.com.my Malaysia is hosting Malware

G

Lazada.com.my contains malware. Your computer might catch a virus if you visit this site. Google has found malicious software may be installed on your computer if you proceed. WOW, Lazada Malaysia apparently has been infected with some rather nasty infection. My version of Google Chrome prompted this when I tried to visit the site today. Hope everything is alright over there in Lazada...

HTTP vs. HTTPs : Why SSL and TLS are important

H

I was looking for some detail on Maxis Fibre to Home service until I came across this while trying to to access the Maxis Customer Forum online: In the early days of the internet, all the data flowing through was done in plaintext, this meant that everything flowing on the internet was fair-game for anyone to hijack and view. It was akin to sending postcards all around, all the post-men and...

MSC Cloud Initiative : Why it’s a bridge too far

M

Why does Amazon–arguably the biggest cloud player in the world–choose to launch it’s Asia-Pacific Offering in Singapore rather than Malaysia? One would think that the prohibitively high prices of land in Singapore, coupled with it’s higher base cost and employee wages would make Singapore a terrible place to put up a Huge Datacenter comprising of thousands of Servers and...

NFC page hacked

N

The guys over at the NFC can’t really catch a break. The National Feedlot Corporation have had a lot of bad luck lately, but I guess when you get an RM250 Million dollar government loan when you’re wife is a Government minister–you’ve probably already had your fair share of good luck. With the recent arrest of Rafizi Ramli, the up and coming PKR young gun–the SGP...