Chin Yee's World

A depiction of my world at work. How will it continue? Nobody knows. We shall see...

Monday, March 21, 2005

Cabir Virus

Cabir Mobile Phone Virus

I was particularly interested in the mobile phone virus that was mentioned in the class and thus went to look up more about it. Basically, a person's phone which is infected would present symptoms as stated below.

  1. Shortened Battery Life
  2. Experience a series of error messages that requires clicking

Mobile phones that are infected must also have the following to be qualified for infection

  1. Running the correct version of Symbian OS
  2. Bluetooth capability
  3. Within broadcast range of another infected phone

In all, such a way of infection is slow and easy to detect given prior knowledge about it.

Thoughts After the 9th Seminar

Today was definitely quite an eye opener for me. The presentations were quite exciting.

I was definitely quite blown away by the user interface that Biz-EE came up with. However, their presentation was quite blur with some undefined boundaries. Basically, to give it a simple judgement is, the image was impressive for the eye, but in the end, no one knows exactly how it works. This is quite a problem with some teams later too.

Another team that I was particularly impressed with was the Virtual Paper Presentation. They actually made it possible to draw stuff on the board with the mouse. Would definitely like to know which plugin they used.

As for our own presentation, we were quite pleased with the results. Especially after Prof Gilbert gave an affirmation that it was definitely a saleable product after seeing the goals on the phone. Definitely worhted the three days and nights of work. Thanks guys, for the overnights that all three of us put in!!!

Tuesday, March 15, 2005

Internet Threats

A New Era of Security Threats

This is really a very interesting article, and good article in my perspective.

It speaks of a new type of virus detection through behaviour detection. In computational perspective, this would be quite a gargantual task as such behaviours might take up millions of instances, and perhaps even filter out helpful sequences.

In my own opinion, virus attacks would always progress with the advancement in antivirus software. It would take a very very long time in order to garner security that is tight enough to put all consumers at ease.

Thoughts after the 8th Seminar

Today, there were some samples of the proof of concept for us to share.

Its seems that there were quite a few different ideas going around. Firstly there is the Neopets look a like website game. It sounds decent, but was an obvious imitation of Neopets. Anyway, they lacked a WAP representation on the phone, which I think is a highly important factor in the presentation of proof of concept.

Next, there is the game on Navy, Explorers, and Merchants. This again is an imitation of the highly popular game "Uncharted Waters" that was the rave a few years back. I guess most ideas are copies of each other nowadays. However, it looks like it would prove to be an interesting idea with wonders of the world to be discovered.

These have proven to be good examples that could be taken into consideration during our presentation.

Monday, February 14, 2005

Thoughts after the 5th Seminar

Hmmm, this is quite an outdated post for something that happened quite long ago. Was busy having fun during the CNY period. Hee.

I guess what was most memorable was the quiz that we took during the lesson. It was really quite a shock for me. I would have certainly failed it if it was teh exams. What was worse was that this was the 1st time that I forgot to bring my text and it had to be an open text exam. My ending result was of course not that impressive. Hee.

This really boils down to consistent work I guess. Onwards with the new year!

Wednesday, January 26, 2005


Article on Honeypots

This week's article is on an interesting internet security technology called Honeypots. A honeypot is basically "a security resource who's value lies in being probed, attacked or compromised.". This may seem difficult to understand at 1st glance but would sound logical as more is revealed about honeypot.

A honeypot basically emulates activities and programs in the computer and allows itself to attacks. It normally has no traffic through it as its IP would not be used by any user within the system. Thus, data collected from accesses would be of high value as they would be likely attacks. Honeypots have different levels of complexity, from a simple service that are meant as targets for port scans, ftp attacks to complex services which allows a single computer to emulate itself as thousands of computers and operating systems to attract attacks. Some are also capable of sending false replies to the attackers and make port scans of them.

From what I have learnt, honeypots are mainly differentiated by the level of emulation it can undertake. The lower the emulation, the least damage an attacker can do with the system. However, if the attacker has an OS to play with, much more can be done to the "victim" and thus much more can be learnt about the attacker.

In essence, honeypots can act as trackers to an attacker who has already done his destruction on servers. This is highly useful as some servers cannot be shut down at all due to service requirements and investigating into these honeypots with small amounts of useful data (rather than enormous traffic passing through main services everyday). The other aspect is the researching aspect which allows security professionals to look at what present hackers are able to do by luring them into this trap and investigate their capabilities.

Thoughts after the 4th Seminar

Fast and Furious.

Today's seminar was full of power bursting elevator pitches. The sound system was literally bursting too. Through this particular seminar, I got to learn quite a lot of things.

Most basically, all the students seem to be have different interpretations of what is needed to be done for this elevator pitch. My team's idea was that it should be more formal and states out the tangibles and intangibles within a short span of 3-5 mins. Other teams obviously had different ideas on their minds. Some were made to be like short commercials thats appealing on the whole but lacks a bit of information here and there such as how to contact. Some were obviously not even bothering to take up the challenge of picking up flash as a multimedia presentation tool. Woes to all those who went to all the trouble of learning. And congrats on picking such a useful tool up too.

My final idea of what a ideal business elevator pitch on a streaming video should be like would consist of the following. All these came up during the evaluation of all the other teams' works. (Which is a great way to hold such presentations. Forces me to go through the strengths and weaknesses of each presentation.)

An impactful presentation should consist of

  1. Animations that visually expresses ideas instead of words
  2. Timely music and accompanying sound effects
  3. Entertaining content appealing to buyers' tastes
  4. Ways of contacting the company

Our team would definitely have to improve on visual animations as we have mostly words, but its a piece of work we are still proud of. YEAH!

Monday, January 24, 2005


Article on WiMax

This article is based in America where it is expected start the use of WiMax nationwide by 2007. WiMax is actually long distance WiFi which is able to cover distances up to ten miles instead of the short distances covering only cafes etc.

This poses as a disruptive technology especially to telephone and broadband service providers. It disrupts telephony industry in quite a major way esp with the predominance of VoIP nowadays worldwide. Having such a big wireless network would just make it even easier for VoIP on the move rather than just in front of a terminal.

Thoughts after the 3rd Seminar

Today's seminar finally made the course look more like a business module to me.

We were first introduced to a comic called "Tokyo Tribes II". Its making into a movie by Hollywood opens up many oppurtunities for businesses. It shows the potential for such a comic that is distributed quite widely online.

Finally, what made the lesson most like a business module was the introduction to revenue models. It was concluded that e-commerce companies failed in the first wave due to the belief that as long as you can copy the existing business models of successful companies, the company itself would also be successful. What these companies neglected, was what actually brings the revenues in, which is what keeps the business going. That is where the revenue model comes in. It is very important in e-commerce, as the model explicitly specifies the business processes that brings in the revenue.

There was also mention of intermediation and disintermediation which I would have to look up more in the textbook to distinguish which one my project would belong to. Thats all for now, back to flash studying...

Sunday, January 16, 2005

Mesh Networks

"A mesh network is a network that employs one of two connection arrangements, full mesh topology or partial mesh topology. In the full mesh topology, each node is connected directly to each of the others. In the partial mesh topology, nodes are connected to only some, not all, of the other nodes."

This definition of mesh network gave me quite an overview of this technology. Abstract it may seem, but it does wield high possibilities. For this week I decided to find an article on Mesh Networks which was mentioned during the seminar.

The following article, Wireless Mesh Networking was found and proved to be a very enriching article. It has shown benefits of wireless mesh networking from the following.

  1. Price
  2. Ease and Simplicity
  3. Organisation and Business model
  4. Network Robustness
  5. Power
  6. Integration
  7. Reality Fit

What really struck me was the points 4, 5 and 7. Mesh Networking is indeed a solution to stable networks which is flexible enough for real life uses where not all networks can be described by star, ring or straight line networks. The point of using solar and wind power for the nodes also proved to be interesting.

Another point raised was the possibility of using pda and mobile devices as nodes. If this is realised, mesh networking would really become a world wide network where it would exist wherever there is people.

Thoughts after the 2nd Seminar

For this session, we were introduced to html. I was quite adament before the lesson on how well I could get involved in this as I am quite illiterate in the html sense. Have always thought that with Development Kits such as Dreamweaver and drag-and-drop software, html would no longer be important.

There were quite some interesting stuff that I learnt today. Things that I always wanted to know but somehow didn't go about learning. Such as using "a href" to make links and other html stuff.

The most interesting one was "meta". I had always wondered how search engines go about searching through websites. Do they plough through all the wordings? Finally I got my answer from this course.

Well, back to finding some articles for the week!

Saturday, January 08, 2005

RFID (Radio Frequency Identification)

This article found at computer times, "RFID spells convenience for all", caught my interest whilst I was browsing through the net. It describes a current technology that is being used for scanning tags on merchandise. It is a technology that has been around for quite some time, but people have been hesitant in implementing it due to worries in high costs of the tag.

An advancement in the ability to print electromagnetic ink on paper has made this technology much more cheaper and possible for implementation in supermarts. Radio tagging is already in use in National Libraries here. Its benefits can be seen from this article here

The advancement in lowering costs of radio tagging reminds me of the lesson on disruptive technology as discussed on the 1st seminar. This is quite an appropriate example. If the technology manages to lower costs of this radio tagging to US 5 cents per piece, it would change the whole outlook of supermarts payments. Cashiers would be faced out and queues wuld be substantially shorter. Thus, shows its disruptive nature.

Hmmm, shall be looking around for more interesting stuff related to RFID next time. Till then...