All posts tagged “TM

comment 1

DAP lodges report with MCMC over blocked sites

Blue Coat packetshaper

Two days ago, the Democratic Action Party (DAP) lodge a report to the MCMC on an ‘internet blockade’ targeting DAP related political websites that was allegedly being carried out by Telekom Malaysia (TM). As you may know TM is the largest ISP in Malaysia, and if TM suddenly blocks a website–a large chunk of the Malaysian public are automatically denied access to it.

The DAP IT manager (didn’t know the DAP had an IT team now did ya?), in his press statement said that :

In investigating the DPI filtering equipment location, I have found 1032 suspicious network equipment using same IP address family as the the Arbor Network Peakflow SP with TM branding. Since the login page of this network equipment bears TM logo, undoubtedly MCMC should haul up TM and conduct IT forensic investigation on all 1032 equipments without delay. I am fully prepared to assist MCMC in its investigations.

In light of this new evidence, MCMC must re-examine its 2nd May statement. MCMC should be politically impartial and hold the standard of government regulatory body that it should be. It must put the interest of all Malaysians first.

Now this isn’t really news, to be fair the Arbor Network Peakflow SP solution is meant primarily as a DDoS protection security suite with a slight tinge of DPI functionality added on the side. TM in their defence haven’t really denied they own the Arbor Network solution–there’s even a joint press release from 2004 to announce their purchase of it.

Unless TM operates like the government, in which they announce the purchase of something in 2004, but only start to using it in 2013–I’m guessing they were using Arbor for other purposes before they decided to unleash its DPI functionality.

But there could be a twist.

comment 1

One Visa files suit against TM : Is it a Human Rights abuse?

The Star today reported that a company called One Visa is suing Telekom Malaysia (TM) for providing telecom services and infrastructure to squatters on it’s land in Negeri Sembilan.

TM was alleged to have trespassed five pieces of One Visa’s land by supplying the telco services to the illegal occupiers of its land.

One Visa had sought RM23.07mil as special damages being the total rental value of the land based on current market value rates calculated from March 22, 2011 and continuing until cessation of the telco services and the date of removal of TM’s infrastructure from the land.

That’s right 23.07mil in ‘special’ damages for the TOTAL rental value of the land, because TM had supplied telco services to the illegal occupiers.

Now, I’m no lawyer and I’m not familiar with the case, So I cannot comment on the legality (or illegality) of the squatters staying on the land. What I can comment on though is the utter ridiculousness of the suit to sue TM for the full rental of the land just because TM had supplied telco services. That’s like charging your neighbour rental for your entire house value, just because his mango tree has over-grown into your garden.

comments 8

Is your Wi-Fi safe?

With the newly enacted Evidence Bill Amendment, you would have been deemed to have published everything that originates from your IP address. What that means is that if someone hacks your Wi-Fi and then uses it to publish malicious or seditious statements online, you will be deemed to have published it, and the onus is on YOU to prove you’re innocence rather than for the prosecution to prove your guilt.

So obviously with the new law floating around, Wi-Fi security should be at the top of every Unifi Subscribers agenda–if it isn’t already.

However, how secure is your Unifi Wi-Fi connection?

The short answer is not so secure.

The brilliant blog Lifehacker recently posted an article on how you can hack Wi-Fi connections secured by a WPA or WPA2 password. The post is quite detailed but even I have to admit the technical skills neccessary to pull this off is somewhere between intermediate and expert. At the end of the post is a link to a spreadsheet detailing all the devices that are susceptible to this hack, and one of those devices is the DLink Dir-615 Wi-Fi router, if it doesn’t sound familiar let me refresh your memory–it’s the router that Unifi gives out to all Unifi customers!!! (que bone-chilling Alfred Hitchcock Movie sound)

Now taking aside the fact, that I could probably call all Unifi customers to request the Wi-Fi password printed at the bottom of their router, and 50% would probably provide that to me with no issue, this also means that for those people smart enough to hide their passwords — I can still hack your Unifi Wi-Fi connection no matter what you do on your router. There’s literally nothing you can do, hiding SSIDs don’t work and neither will MAC address filtering. Of course this is all theory, and testing this theory took a lot more time than I had, so I’m not sure.

What I am sure is that Unifi have their own firmware for the DIR-615 router, and that’s a partially susceptible router, meaning some firmwares are susceptible some firmwares aren’t, and it’s a coin toss and whether your router at home is susceptible.

Now, while I know of a few people who hack Wi-Fi passwords just for the fun of it,and there’s a lot of references and material online detailing the steps required–so we all know this works. In fact you can buy packages online that allow you crack the routers easily :). This blog written in Malay claims that they’ve successfully hacked a DLink Dir-615 router, I’ve no doubt it’s possible, but it’s not easy and it takes time.

Either way though, it’s always good to remember this. There is no such thing as impossible to crack, merely inconvenient and infeasible. Don’t believe me? Check out this story of how a group of University Students manage to hack a US Military Drone in mid-flight using nothing more than $1000 worth of equipment, do you really think your Wi-Fi at home is more secure a ‘death from above’ US Predator Drone? Every Wi-Fi access point hackable, it’s only a matter of how much time, effort and money is required.

comments 10

TM Unifi speeds actually quite GOOD!

While they may have caused “The Great 9 day downtime of 2012“, and I ‘might’ have been terribly upset with them. Over the past few months, I must admit– My Unifi Connection Speed is Absolutely brilliant!!

Say what???!

You heard me right, although I had a terrible 9 days of no internet earlier this year, Unifi has been nothing but buttery silky smooth ever since. It’s really amazing, and for the price I’m paying I’m not complaining, in fact I’m actually congratulating Unifi for their great service. That’s right Unifi, here’s a congratulations to you!

It’s true, many people have wrote to me (some publicly, most privately) to complain about the service they get from Telekom Malaysia, and I still think they could do more to improve the quality of their customer service, as well as the processes behind them. I also think that these downtimes should be avoidable on Telekoms part, and Telekom should work better to win back and compensate affected customers.

However, it must be said that for me at least, my Unifi connection speed for torrent downloads and youtube videos is more than good enough, and here’s the proof.

comments 28

Unifi sucks: Here’s why

Last year I moved into my new place, and had to apply for Yes! broadband because my place wasn’t Unifi ready yet. I blogged about how much I enjoyed the Yes! experience and even recommended it to most friends and family. That little love affair however took a turn for the worst when I discovered Yes! would experience a service interruption nearly once a month and the overall design of the Yes! service was lacking. So in the end I parted ways with Yes! and subscribed to Unifi instead.