Wednesday, February 18, 2009

Communication ControL..

Communication (network) controls secure the movement of data across networks.A few example of it is :-

=>Firewalls
-is a system that prevents a specific type of information from moving between untrusted networks,such as the Internet, and private networks,.Put simply,firewalls prevent unauthorized internet users from accessing private networks.
-can consist of hardware or software or both.

-Used on;-
-- basic firewall fo a home computer. In this case, the firewall is implemented as software on the home computer.
--an organization that has implemented an external firewall,which faces the Internet, and an internet firewall,which faces the company network.A demilitarized zone (DMZ) is located between the two firewalls. Messages from the internet must first pass through the internet firewall. If they conform to the defined security rules,then they are sent to company severs located in the DMZ.These servers typically handle Web page requests and e-mail. Any messages designated for the company’s internal network (for example, its intranet) must pass through the internet firewall, again with its own defined security rules, to gain access to the company’s private network.
-The danger from viruses and worms is so severe that many organizations are placing firewalls at strategic points inside their private networks. In this way, if a virus or worm does get through both the external and internet firewalls, then the internal damage may be contained.

=>Anti-malware systems

-Also called AV or antivirus software,are software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
-For example, Avira , Norton and whatsoever.
-anti malware system are generally reactive.It works by creating definitions, or signatures,of various types of malware,Next,updating these signatures in their products and then examines suspicious computer code to see if it matches a known signature. If it does,then the software will remove it.
-Nowadays there are anti-malware systems that function proactively as well as reactively. This systems evaluate behavior rather than relying on signature matching.In theory, it is possible to catch malware before it can infect system.Example (www.cisilion.com/cisco-security-agent.htm) and www.prevx.com .


Top ten antivirus:-


#1 Bit Defender Antivirus (Actualy I Hate It.hehe)



#2 Kaspersky-Anti-Virus



#3 Webroot Antivirus



#4 G DATA Antivirus



#5 ESET Nod 32



#6 Paretologic Anti-Virus Plus



#7 AVG Antivirus




#8 Vipre Antivirus Antispyware




#9 F-Secure Anti-Virus



#10 Trend Micro



Chriteria That is Count For Rating
~Ease Of Use
~Effectiveness
~Updates
~Feature Set
~Ease Of Installation
~Help/Support
(http://anti-virus-software-review.toptenreviews.com/)



=>Whitelisting and Blacklisting
-99 percent of organizations had anti malware systems installed, but 62 percent of companies still suffered successful malware attacks.
-One solution to this problem is whitelisting and blacklisting. Whitelisting allows nothing to run unless it is on the whitelist while blacklist allows everything to run unless it is on the blacklist.
-In more details, whitelisting is a process in which a company identifies the software that it will allow to run and does not try to recognize malware.
-it permits acceptable software to run and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
-while blacklist includes certain types of software that are not allowed to run in the company environment.For instances,a company might blacklist peer –to – peer file sharing on its systems.
-In addition to software, people,devices, and Web sites can also be whitelisted and blacklisted..


Some nice words.."Trollope admitted that poor performance was the main reason Norton Internet Security customers abandoned previous versions of the product. In the next version, he explained, a "whitelisting approach" significantly reduced the amount of time scanning files that are known to be safe.

"It does use whitelisting as an approach, but it really focuses on the performance gains we can get by not having to scan things on the whitelist," he said. Norton 2009 security suite, according to the company's vice president of consumer engineering, Rowan Trollope."(This word i take from http://keznews.com/4878_Norton_2009_tackles_whitelisting.htm..)

=>Intrusion Detection Systems(IDS)

-Is a software or a hardware that are designed to detect all types of malicious network traffic and computer usage such as accessing, manipulating or disabling of computer systems that cannot be detected by a firewall.These systems capture all network traffic flows and examine the contents of each packet for malicious traffic.
-An example of this type of malicious traffic is a denial – of – service attack.
-An IDS can be composed of several components:
Sensors which generate security events,
a Console to monitor events and alerts and control the sensors, and
a central Engine that records events logged by the sensors in a database and uses a system of rules to generate alerts from security events received.
-There are several ways to categorize an IDS depending on the type and location of the sensors and the methodology used by the engine to generate alerts. In many simple IDS implementations all three components are combined in a single device or appliance.
Types of IDS
-A network intrusion detection system (NIDS)
-A protocol-based intrusion detection system (PIDS)
-An application protocol-based intrusion detection system (APIDS)
-A host-based intrusion detection system (HIDS)
-A hybrid intrusion detection system combines two or more approaches for examples prelude.


My References
Information Literacy Book Page 85-86
http://www.mcafee.com/
http://www.avg.com/
http://www.symantec.com/norton/antivirus
http://www.avira.com/
http://www.keznews.com
http://www.wikipedia.com
http://www.cisilion.com/cisco-security-agent.htm
http://www.prevx.com
http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci896131,00.html(Whitelist)
http://www.ipcortex.co.uk/wp/fw.rhtm (Internet firewall tutorial)
http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm (Intrusion Detection System)

Monday, January 19, 2009

Support For Palestinians!!




Hingga hari ini kita menyaksikan penindasan kaum muslimin Palestin oleh kaum yahudi. Seperti yang sudah-sudah, kita bosan melihat tingkah Barat dan kaum muslimin sendiri yang tidak melakukan aksi nyata. Oleh karena itu sebagai kaum muslimin yang jauh dan tidak berdaya mari kita membaca Qunut Nazilah yang intinya mengutuk penindasan kaum muslimin, dan melindungi kaum muslimin Palestin. Kerana Allahlah Tuhan tempat kita meminta pertolongan.





Kita juga boleh membaca surah Al-Fil:
“Ya Allah!!Sebagaimana Engkau Pernah menghantar burung-burung ababil menghancurkan tentera bergajah Musyrikin, maka kami memohon kepada mu Ya Allah… turunkan lah bantuan mu kali ini kepada orang orang Islam di Libanon/Palestin, hancurkanlah rejim zionis. Amin. …
> >(membayangkan kehancuran tentera Yahudi - dengan Izin Allah)
Pastu baca surah Alf-Fil...* (Nota: Bacaan ayat Quran dalam bentuk tulisan rumi boleh mengandungi kesilapan. Bacaan yang terbaik adalah dalam bentuk tulisan Arab itu sendiri. Harap maaf sekiranya terdapat kesilapan pada tulisan rumi tersebut).

Boycott This Products!!


Wednesday, January 14, 2009

Cyber Squatting???

Definition??
Cybersquatting – the unauthorised registration of domain-names featuring a brand name.

How It Works??
This is a cheap and simple method to take advantage of another’s off-line brand
reputation.

Example??
www.sony.com(Official Sony Corporation)
www.soni.org (No Information as the plugin is missing..heheh)

www.sonidesigns.com(Boutique)


www.puma.com(Official PUMA brand website)
pumapac.org(People United Mean Action)
www.pumastrut.com(United Kingdom company specializing in releases on the vinyl 45 format)
chocolatepuma.com(Duno wat is this)

www.asadi.com.my(Official Branded Footwear)

www.
asadi.org (Bibliography)

www.asadi52.8k.com(Saeid Asadi)
www.asadi-machinery.com (Asadi Machinery PolyUrethane Equipment)
robots.asadi.org (The Brave New World)

The information about 3 different books from human sciences,law
and technology field is...

Human Sciences
Ethics & Human Sciences/Keith Amarakore,Sukhmeed S.Panesar
Author's Name : Amarakore and Keith
Subjects : Medical Ethics
Call NO. : R724A485E
Barcode : 00001063531
ISBN : 0723433461(p.b.k) & 9780723433460(p.b.k)

Law
Admiralty Law & Practice / Toh Kian Sing
Author's Name : Toh Kian Sing
Subjects : Admiralty-Malaysia & Admiralty-Singapore
Call No. : d27KPP93T645A
Barcode : 00000554895
ISBN : 0409999091

Technology
Information Technology : Design & Applications Edited By Nancy D. Lane & Margaret E. C hisholm
Author's Name : Boston,Mass. : G.K Wall,1990
Subjects : -Library Science - Technological Innovations.
-Information Technology - Law & Legislation
-Libraries - Automation- Computer Optical Discs.
Call No. : Z678.9143L
Barcode : 00000055773
ISBN : 0816119082

staff.iiu.edu.my/masmadyz
I like about this blog because....

1.The colour choosen are suitable with Bro Asmady personality and so attractive..He avoid the viewer from having pain in their eyes because the use of bright colour..heheh
2.The organize of the content is systematic with a little bit islamic information that is Prayer Time..Heheh ..This blog have shoutout box for student to impress whatever they want...
3.The important things about this blog is Bro Asmady keep it simple where he give a short decription but full of information and some attractive picture for his students..


URL's name for Kuliyah ICT is..
http://www.kict.iiu.edu.my


List of Red Spot books collection that I found in the library which are mostly used by IIUM's student at PJ Campus ..

1.Architecture of Siam - A Cultural History Interpretation By Clarence Aasen.(ISBN 983-56-0027-9)
2.Bali Style by Rio Helmi & Barbar Walker.(ISBN 0-500-28415-6)
3.Fundamentals of Chemistry Third Edition By Ralph A. Burns.(ISBN 0-13-918665-4)
4.Chemistry Principles And Reactions Fifth Edition By Masterton & Hurley.(ISBN 0-534-40878-8)
5.Precalculus Enhanced With Graphing Utilities By Michael Sullivan And Michael Sullivan III (ISBN )
6.Organic Chemistry By LG Wade And JR.(ISBN 0-13-922741-5)
7.Human Anatomy & Physiology Fifth Edition By Elaine N. Marieb.(ISBN 0-8053-4989-8)
8.Organic Chemistry By Jenice Gorzynski Smith(Text ISBN 0-07-239746-2,Component of Pkg ISBN 0-07-310170-2)
9.Biology Seventh Edition By Campbell Reece.(ISBN 0-8053-7146-X)
10.Biology A Functional Approach Students Manual By TJ King.(ISBN)
11.Calculus For Engineers By Donald Trim(ISBN 0-13-085603-7)
12.Calculus Fourth Edition By james Stewart.(ISBN 0-534-35949-3)
13.Chemistry The Central Science Ninth Edition By Brown,LeMay And Bursten.(ISBN 0-13-066997-0)
14.Introductory Chemistry Second Edition By Steve Russo & Mike Silver.(ISBN 0-321-04634-X)


Sunday, December 28, 2008

Lets Discuss About How to Tackle a Girl!


Serious Topic..Hehe
Ok now let see how to tackle a woman using my own theory "Five Zul's Force"..heheh..(This just for releasing my stress because of studying about five porter's force)

1. Entry of competitors. (How easy or difficult is it for new entrants to start competing, which barriers do exist).Which mean if u want to tackle a girl u need to define how many competitors u have to get the girl before u start competing... For example,Hairee want to tackle Syafiqah,he need to observe first who are more closest with Syafiqah..(Syafiqah's boyfriends only) If Syafiqah already have one or maybe many,it is difficult for Hairee to tackle Syafiqah..

2. Threat of substitutes. (How easy yourself can be substituted, in other word we say uniqueness[keunikan]).If Hairee was the person that have different behavior and Syafiqah find that is hard to find other boys like Hairee,the way for Hairee to tackle Syafiqah will be easier...

3. Bargaining power of buyers. This porter's statement we change to bargaining power of supporter..Can they work together in matching u with someone u admired or love??.For instance,Hairee have many friends that always matching him with the girl he like,Syafiqah..It will give bright chance for him to get more closer with Syafiqah because of the gossip his friends created..This also will break other boys' heart to get closer with Syafiqah as the gossip was being so painful for them..

4. Bargaining power of suppliers. (Do many potential suppliers exist or only few potential suppliers to help u in giving information about the girl that u love??)Sometimes we need the help from others to tackle the girl that we love.This happen when we need an information about the person we love to get more closer with her.In essence we need information's suppliers which come from her(the person u admired) friends or even family.This due to the fact,"who the one that a girl like?The person who know about her or the person that know nothing about her??"Example,Hairee gathering an information from Syafiqah's friends about what food she like so that he can make Syafiqah touched because Hairee know what food that she loves..Attention=girl like the guys who are romantic.This information also can help Hairee to have topic to chat with Syafiqah in "sms" in case he is blank of what topic to share or to say with Syafiqah..

5. Rivalry among the existing players. (Does a strong competition between the existing players exist? Is one player very dominant or are all equal in smartness or appearance??)When Hairee want to tackle Syafiqah,his smartness and appearance will be the important asset for him..

Haha finish discuss about this..Hope can help us to memorize porter's five force..

Monday, December 15, 2008

Lets Talk bout Porter's Five Force!


What is the Five Forces model of Porter?

The Five Forces model of Porter is an Outside-in business unit strategy tool that is used to make an analysis of the attractiveness (value) of an industry structure. The Competitive Forces analysis is made by the identification of 5 fundamental competitive forces:

1. Entry of competitors. (How easy or difficult is it for new entrants to start competing, which barriers do exist).
2. Threat of substitutes. (How easy can a product or service be substituted, especially made cheaper).
3. Bargaining power of buyers. How strong is the position of buyers. (Can they work together in ordering large volumes.This also refers to POWERFUL CUSTOMERS that buy a thing based on their knowledge on that thing for example Amirul buy a computer based on his knowledge on ICT)
4. Bargaining power of suppliers. (How strong is the position of sellers. Do many potential suppliers exist or only few potential suppliers, monopoly?)
5. Rivalry among the existing players. (Does a strong competition between the existing players exist? Is one player very dominant or are all equal in strength and size.)

Threat of New Entrants depends on:

* Economies of scale.
* Capital / investment requirements.
* Customer switching costs.
* Access to industry distribution channels.
* Access to technology.
* Brand loyalty. Are customers loyal?
* The likelihood of retaliation from existing industry players.
* Government regulations. Can new entrants get subsidies?

Threat of Substitutes depends on:

* Quality. Is a substitute better?
* Buyers' willingness to substitute.
* The relative price and performance of substitutes.
* The costs of switching to substitutes. Is it easy to change to another product?

Bargaining Power of Suppliers depends on:

* Concentration of suppliers. Are there many buyers and few dominant suppliers?
* Branding. Is the brand of the supplier strong?
* Profitability of suppliers. Are suppliers forced to raise prices?
* Suppliers threaten to integrate forward into the industry (for example: brand manufacturers threatening to set up their own retail outlets).
* Buyers do not threaten to integrate backwards into supply.
* Role of quality and service.
* The industry is not a key customer group to the suppliers.
* Switching costs. Is it easy for suppliers to find new customers?

Bargaining Power of Buyers depends on:

* Concentration of buyers. Are there a few dominant buyers and many sellers in the industry?
* Differentiation. Are products standardized?
* Profitability of buyers. Are buyers forced to be tough?
* Role of quality and service.
* Threat of backward and forward integration into the industry.
* Switching costs. Is it easy for buyers to switch their supplier?

Intensity of Rivalry depends on:

* The structure of competition. Rivalry will be more intense if there are lots of small or equally sized competitors; rivalry will be less if an industry has a clear market leader.
* The structure of industry costs. Industries with high fixed costs encourage competitors to manufacture at full capacity by cutting prices if needed.
* Degree of product differentiation. Industries where products are commodities (e.g. steel, coal) typically have greater rivalry.
* Switching costs. Rivalry is reduced when buyers have high switching costs.
* Strategic objectives. If competitors pursue aggressive growth strategies, rivalry will be more intense. If competitors are merely "milking" profits in a mature industry, the degree of rivalry is typically low.
* Exit barriers. When barriers to leaving an industry are high, competitors tend to exhibit greater rivalry.

(Adapted from http://www.valuebasedmanagement.net/methods_porter_five_forces.html.. Just for reference madam..I'm not doing plaquarize...hehe)


Strategic Analysis of Intel Corporation

Using Porter's framework to determine the impact of current competitors, potential entrants,Buyers,suppliers, and potential substitutes to compared this gigantic company(This all based on my research on the website,maybe have plaguarize it a bit..hehe):

  • Current Competitors: Intel has many Strategic Business Units, but only two were common to us—Microprocessor manufacturing and Chipset manufacturing. From the perspective of the Microprocessor SBU(Standard Build Unit) , only one true competitor remains: Advanced Micro Devices. Having vanquished all other microprocessor developers such as Cyrix and Nexgen , Intel's only real competition comes from the developers of the Athlon,Thunderird, and Sledgehammer CPUs.

    Designed for high-end processing and placed in direct competition with Intel's Pentium III and Pentium IV CPUs, AMD's new processors pose a significant threat to Intel in many different ways. First, AMD has successfully stolen market share from Intel over the last few years (albeit mostly due to shabby management on Intel's part). Second, AMD has succeeded in proving itself as a true PC platform alternative; until its pre-Pentium-IV Athlon became the first CPU to pass the 1.0 GHz mark, many failed to consider AMD as a true contender for the high-end workstation and server market. But beating Intel to 1.0 Gigahertz had an incredible affect on the industry, encouraging many manufacturers to start carrying AMD-powered machines, thus opening a great deal more of the market originally dominated by Intel.(Great rite..)

    But AMD's luck was short-lived. Intel immediately fired back, reclaiming the "fastest processor" title with a later iteration of its Pentium line, and using mafia-like (and ethically questionable) marketing tactics to encourage computer manufacturers to stop carrying AMD processors. The manufacturers capitulated, and eventually almost all of the major computer brands were again Intel-only.(That's cheated but it's all bout business strategy)

    Intel's aggressive comeback against AMD has not been without its costs, however. By slashing margins to entice computer manufacturers into exclusive contracts, the firm regained much of its lost market share at the cost of profits. However, a price war between a gigantic company like Intel and a relatively tiny company like AMD shouldn't last long. Intel certainly has deep enough pockets to keep the squeeze on AMD for some time.

    The outlook for the Chipset SBU is somewhat similar. With only one real competitor—VIA Technologies, a critical partner with AMD who manufacturers Athlon-compatible chipsets—Intel once again finds itself in the position of Cat vs Mouse(Like Tom And Jerry..Hahaha). Although not mentioned in the text, VIA's Motherboards and chipsets are considered by most to be far inferior to those developed by Intel. In fact, the requirement that one use a VIA motherboard (rather than one developed by Intel) with an Athlon processor has caused many users to shy away from AMD altogether. Often, bugs arise from faulty VIA chipsets and motherboards, and the "AMD Architecture" gets the blame, despite AMD's lack of responsibility. Still, without AMD there would probably be no VIA—and without VIA, AMD would have to develop and manufacture its own chipset—something it probably cannot afford to do. Thus the fate of these two companies is hopelessly intertwined; when attacks by Intel weaken one company, in reality, they weaken both(The AMD and VIA companies).

  • Potential Entrants: None, nor should we expect to see any soon.The capital expanditures required to develop and manufacture microprocessors and chipsets is enermous—an insurmountable entry barrier for almost any company that would like to join the fray. Companies wishing to enter this industry need only to look at one of Intel's multi-billion-dollar chip fabrication plants before s/he will undoubtedly find some other industry to invade.(This statement I completely plaguarize...)

  • Buyers: Buyers include end-user home computer builders and small "PC-Clone" shops that build customized machines in most cities. But large computer manufacturers such as Dell, Gateway, and Hewlett-Packard(HP) account for the vast majority of chipset and microprocessor purchases. Buyer power in this industry has fluctuated from time to time, but for the most part, the "Intel Inside" logo has been considered by most manufacturers to be too important to forgo(to pass by). Until the Athlon made a serious challenge to Intel's prime markets, buyers simply had nowhere else to turn for microprocessors. Until the Athlon, buyers had to choose between pricey-but-respected Intel chips or chips by AMD that cheaper and a bit same performance like Intel, considered by most to be inferior to their Intel counterparts.

    Buyer Power increased sharply when this new option arrived—manufacturers actually had more than one company from which to buy CPUs! However, buyer power has markedly diminished since that time due to exclusive contracts and pressure from Intel to keep AMD out of their machines.

  • Suppliers: Intel's suppliers are not mentioned in the text, but it is safe to assume that the company's suppliers have the same lack of selling power as other commodity brokers in the tech industry. Intel's raw materials—silicon, semiconductors, and the like—can be purchased from a litany of manufacturers, thus affording the firm a great deal of buyer power in selecting with whom to do business.

  • Potential Substitutes: While other companies do manufacture competing server/workstation platforms (such as Sun Microsystems and Digital Electronics, before the latter was purchased by Compaq), these companies only compete in a limited number of arenas. The most powerful Windows/Intel server is far less powerful than most Sun Microsystems machines, but they are also far less expensive. One might argue that comparing Intel/Windows machines to Sun/UNIX machines is much like comparing a nail file to a hacksaw—the analogy is simply inappropriate. Regardless, while Intel's customers (such as Dell and Compaq) might compete on a limited basis with companies like Sun, Intel's only fear of substitution comes from AMD...and the occasional abacus*.(Cina say it as Sempoa).

With that being said, one might hope to identify some of Intel's core compentecies and competitive advantages. Certainly, Intel's position as the "gold standard" for PC architectures must be counted among the company's competitive advantages. When Intel decided to switch from "socket" to "slot" processors, the industry (including AMD) followed suit. When the new "slot" architecture was found to be unwieldy, Intel switched back to sockets—and the industry followed once again. By serving basically as "the R&D for the entire computing industry," Intel is able to steer trends and technologies in ways that best benefit the itself.

As the conclusion,Intel as the gigantic company has manipulated the five forces model to remain as the bestest producer of its products.........The end!!

Sunday, December 07, 2008

Selamat Hari Raya Aidiladha


Selamat Hari Raya Aidiladha..Korban jgn x korban..Bez gak raye kat KL nie..huhu.
(gambo ni curi kat website mdam Azimah hahaha sje nk show off)