Before my recent trip to Australia, my brand new Samsung Galaxy S3 failed on me. The speaker just went *kaput*. Well not really *kaput*, but there was absolutely no sound coming out of it. Needless to say I was a bit frustrated, annoyed and just downright disappointed. This was an expensive top of the line phone, and it’s speakers shouldn’t be failing after barely 4 months. So I...
How to Port Forward your Unifi Dlink Dir-615 router
Port Forwarding is a really simple concept, but a very important step you need to take if you want to remotely access the devices you have at home. For instance, if you have a Unifi connection connected to an always on desktop and you wanted to Remotely access your windows machine, you’d need to perform port forwarding on your router. Similarly if you’ve just installed a new IP camera...
Data Coverage Down Under
I’ve just come back from a fantastic 2 week long vacation in Australia, and I absolutely loved it. The weather was a bit cold for my Malaysian body (especially in blue mountains), but overall the holiday was a well deserved break from nearly 8 months of non-stop work ;). The one thing I did notice about Australia though, was that data charges were quite exorbitant. I stayed at various Youth...
Answering the tough questions: Watson vs. Humans
IBM have always been on the cutting edge of innovation, they’ve moved more becoming merely a computer company to what is probably the first truly all encompassing technology company, they don’t just make fancy gadgets or shiny tinga-ma-jigs, they make actual solutions for real-world problems. In 1996, IBM introduced the world to Deep Blue. Kasparov met Deep Blue and wasn’t...
Cracking Passwords with the Cloud
I remember my computer security professor telling me that encryption doesn’t make it impossible to decrypt, but rather infeasible to decrypt. Nobody is going to buy a supercomputer to crack your final year thesis, simply because the data isn’t worth nearly as much as the cost to crack it–thereby making it infeasible. With cloud computing, however, end-users and regular joes...
Evidence Act Technological Misconceptions: A response to Rocky and Fatimah
The government has finally ‘relented’ and now wants to ‘discuss’ section 114A of the Evidence act 1950. Now it’s great because it proves beyond a shadow of a doubt that: 1. The internet can be used for fantastic good. 2. The general Malaysian public can make a difference in the governance of the country. My website also had the pop-up banner, and according to Google...
Maxis Fibre to the Home (FFTH) : Why you shouldn’t get it
Imagine buying a house from a housing developer who insist that even after you’ve bought the house the developer will be allowed access to your downstairs bathroom. So that even after you’ve bought the house and moved in and got that nice kitchen cabinet design you’ve been eye-ing, the developer can still access your downstairs bathroom, no matter what. Worse still, the...
How SSL works: A presentation on Slideshare
Slideshare.net is a great tool to share presentations on the web. Think of it as the youtube of powerpoint presentations. I was toying around with my preview version of Microsoft Office 2013, specifically Powerpoint 2013, and I thought I’d create a new powerpoint to illustrate what I described earlier this week about How SSL works. Hope you guys like the powerpoint presentation, I was just...
Google: Lazada.com.my Malaysia is hosting Malware
Lazada.com.my contains malware. Your computer might catch a virus if you visit this site. Google has found malicious software may be installed on your computer if you proceed. WOW, Lazada Malaysia apparently has been infected with some rather nasty infection. My version of Google Chrome prompted this when I tried to visit the site today. Hope everything is alright over there in Lazada...
HTTP vs. HTTPs : Why SSL and TLS are important
I was looking for some detail on Maxis Fibre to Home service until I came across this while trying to to access the Maxis Customer Forum online: In the early days of the internet, all the data flowing through was done in plaintext, this meant that everything flowing on the internet was fair-game for anyone to hijack and view. It was akin to sending postcards all around, all the post-men and...