<$BlogRSDURL$>

caparuni

do you log today...?

8/08/2004

Upacara Senin Pagi di Sekolah 

Pendahuluan
Biasanya di setiap senin, di sekolah di adakan upacara bendera yg wajib di ikuti oleh seluruh siswa-siswi, guru, bahkan pegawai yg berada di sekolah tersebut,walau pun itu sekolah swasta atau digit (negri).
Tujuan upacara lazimnya adalah untuk mengingatkan kita atas jasa-jasa para pahlawan, memegang teguh pancasila, dan mensyukuri kemerdekaan kita. Tapi terkadang, tujuan upacara sedikit melenceng dari tujuan utamanya bagi para murid atau guru, sebagai contoh akan saya jelaskan di bawah ini:
Para murid:
1. Ajang untuk saling bercerita dg teman kelas/teman antar kelas, tentang kegiatan yang mereka lakukan pada malam minggu.
Bila murid cowok bercerita tentang "cewek yg mereka ajak pergi malam kemaren", maka murid cewek bercerita tentang "apa yang menimpa mereka pada malam minggu kemaren", mungkin ada beberapa yg masih mendiskusikan tugas-tugas dan pelajaran-pelajaran, tapi karena kurang menarik, saya malas untuk membahasnya.
2. Tempat untuk berdiskusi untuk nomat nanti siang
Seperti: dimana? sama siapa aja? naik mobil siapa? eh gua mesti pulang dulu nih ambil baju ganti eh kemaren gua udah nonton film "a", nanti jangan nonton filn "a" yah! eh jangan ajak si "b" yah, gua lagi bt sama si "b"!.
3. Saat yang tepat untuk saling memamerkan atribut2 yang mereka pakai.
Karena disaat ini seluruh angkatan bertemu, dan disini adalah saat yang tepat untuk memamerkan atribut2 mereka, antara lain: sepatu nike baru nitip ama ortu/kakak/kerabat dari singapur,ikat rambut yang beraneka ragam, bandana, potongan rambut baru, gelang yang seabrek-abrek dll.
Para Guru:
1. Tempat meminta dana kepada murid-murid.
Seperti: tambahan dana untuk gedung, fasilitas sekolah, yang entah dananya benar di pakai untuk keperluan-keperluan tersebut atau untuk menambah aksesori kendaraan pribadinya, biasanya motor.
2. Untuk saat bersenda gurau bersama rekan-rekan guru yang lain,apakah para wali kelas ato guru bidang studi.
Kadang terlihat dari kajauhan, 3 orang guru ato lebih, sedang tertawa-tawa kecil walau pembina upacara sedang memberikan amanat upacara.
3. Saat yang tepat untuk melecehkan siswa/siswi yang berkelakuan buruk pada minggu kemarin,di depan 3 angkatan ato lebih.
Karena tidak ada yang lebih baik mengisengi orang yang mereka kurang sukai, dengan cara membuat mereka malu di depan orang banyak.
Harapan Harapan Para Murid Terkadang, upacara bukanlah suatu yg di nanti-nanti oleh para murid, tapi terkadang upacara benar-benar di harapkan durasinya melebihi waktu yang biasanya, dan bukan jarang di pikiran mereka terlintas hal-hal dibawah ini:
-Hujan
Hal ini yang paling sering di harapkan ketika para murid sedang tidak "mood" untuk mengikuti upacara, dan hari ini mereka dapat pulang lebih cepat dari biasanya.
-Mati lampu
Karena bila mati lampu otomatis mic tidak nyala yang berarti pembina upacara tidak dapat berpidato.
-Pidato pembina sebentar
Bila hal ini terjadi, para murid bisa memanfaatkan waktu sisa yang sedikit ini untuk membeli makanan-makanan ringan di kantin.
-Bendera terbalik
Hal ini sering diharapkan, karena bagi para murid,hal ini adalah salah satu penghibur pada saat upacara.
-Pidato pembina panjang
Para murid mengharapkan hal ini terjadi, bila mereka ada ulangan pada jam pertama, dan terkadang ulangan tersebut di tunda, karena waktunya terpotong oleh upacara.
-Lain lain
Seperti tersandung, salah berteriak, saling menabrak bagi paskibra. Lupa memberi hormat, memberikan cerita-cerita lucu, jatuh dari mimbar bagi pembina upacara (hal ini terkadang di nantikan oleh para murid untuk di tertawakan, ini juga merupakan faktor mengapa bersemangat mengikuti upacara bendera).
Hal Hal Yang Bisa Kita Lihat Pada Saat Berlangsungnya Upacara
Setelah pembacaan sila kelima "LIMA! Keadilan sosial bagi seluruh rakyat indonesia" terkadang ada celetukan-celetukan nakal terdengar seperti "ENAM!"
Setelah selesai menyanyikan bait terakhir dari lagu Indonesia Raya "..hiduplah Indonesia Raya" terkadang ada sekumpulan murid yang berteriak "MERDEKA!" secara serempak dan lantang.
Beberapa siswi yang pingsan karena tidak tahan oleh panasnya terik sinar matahari, dan biasanya ada beberapa siswa laki-laki yg membantu untuk membawanya ke poliklinik (walau terkadang mereka membantu hanya untuk menggalkan upacara).
Siswa senior menggoda para siswi junior yang sedang bertugas menjadi PASKIBRA (pasukan kibar bendera), saat mereka sedang berbaris untuk memasang Bendera Merah Putih.
Beberapa barisan yang terdiri dari siswa/siswi yang datang terlambat, lupa membawa dasi, berseragam salah, berisik saat upacara berlangsung (mereka yang kurang beruntung ini biasanya di tempatkan di tempat-tempat yang langsung terkena sinar matahari).

Top 10 Lagu lagu Upacara
Dalam beberapa tahun ini chart lagu-lagu nasional kita mudah berubah-ubah, dapat kita lihat Ibu Kita Kartini turun satu peringkat dari tahun tahun sebelumnya, dan yang baru saja masuk chart yaitu Indonesia Tetap Merdeka, dan Indonesia Raya masih memimpin di peringkat pertama selama 50 tahun terakhir ini.
1.

Indonesia Raya
2.

Padamu Negri
3.

Maju Tak Gentar
4.

Garuda Pancasila
5.

Hari Merdeka
6.

Dari Sabang Sampai Merauke
7.

Halo Halo Bandung
8.

Berkibarlah Benderaku
9.

Indonesia Tetap Merdeka
10.

Ibu Kita Kartini


posted by Capa  # 05:45

2gb email 

Okay guys. .here is what you guys have to do. DO THESE EXACTLY AS
FOLLOWS OR
ELSE YOU WILL NOT GET THE FREE 2GB account

GO to Start menu --> All Programs --> then click
GO to Start menu --> on the MSN Explorer (YOU
MUST SIGN UP for a @msn.com e-mail from the MSN Explorer e-mail
whether you
like it or not)

Then follow the instructions to create a new account (click on I
already
have Internet Access )
It will proceed to ask you questions about password / secret question /
demographics and once you create your username & passowrd, click on
the Mail
(within msn explorer NOT INTERNET EXPLORER) icon and on the left it
will
display 0% of 2000MB


GOOD LUCK. AND I JUST TRIED IT A FEW MINUTES AGO AND REGISTERED A FEW
ACCOUNTS. LET THE GAMES BEGIN.

the free 2gb accounts also have POP access

POP3: pop3.email.msn.com
SMTP: smtp.email.msn.com


posted by Capa  # 05:40

5/16/2004

Student uncovers US military secrets 

An Irish graduate student has uncovered words blacked-out of declassified US military documents using nothing more than a dictionary and text analysis software.

Claire Whelan, a computer science student at Dublin City University was given the problems by her PhD supervisor as a diversion. David Naccache, a cryptographer with Gemplus, challenged her to discover the words missing from two documents: one was a memo to George Bush, and another concerned military modifications to civilian helicopters.

The process is quite straightforward, and according to Naccache, Whelan's success proves that merely blotting words out of declassified documents will not keep the contents secret.

The first task is to identify the font, and font size the missing word was written in. Once that is done, the dictionary search begins for words that fit the space, plus or minus three pixels, Naccache explained.

This process yielded 1,530 possibilities for word blanked out of a sentence in the Bush memo. Then, the text anaysis routine checks for words that would make sense in English. The sentence was: "An Egyptian Islamic Jihad (EIJ) operative told an XXXXXXXX service at the same time that Bin Ladin was planning to exploit the operative's access to the US to mount a terrorist strike." Just 346 words remained on the list at this stage.

The next stage is to involve the brain of the researcher. This eliminated all but seven words: Ugandan, Ukrainian, Egyptian, uninvited, incursive, indebted and unofficial. Naccache plumped for Egyptian, in this case.

Whelan subjected the helicopter memo to the same scrutiny, and the results suggested South Korea was the most likely anonymous supplier of helicopter knowledge to Iraq.

Although the technique is no good for tackling larger sections of text, it does show that officials need to be more careful with their sensitive documents. Naccache argues that the most important conclusion of this work "is that censoring text by blotting out words and re-scanning is not a secure practice".

According to the original report in Nature, intelligence experts may consider changing procedures.

posted by Capa  # 09:03

Nokia's N-Gage...More Than a Cellular 'Gameboy'  

Nokia's new mobile gaming platform, the N-Gage, has a tough market competing against Nintendo's already entrenched GameBoy, Sony's upcoming PlaystationPortable, and the ever advancing line of games-capable cell phones. Nokia is betting that the N-Gage's wireless communication abilities will set it apart and allow multiplayer gaming to move away from computers and living-room consoles and into consumers' pockets. Coming standard with Bluetooth and GPRS internet enabled, the N-Gage has several avenues of wireless communication.

Nokia addresses the question of latency and possible bad connections by differentiating their software titles into two groups, said John Stroppa, one of the N-Gage's lead software producers in an interview with DailyWireless. Fast paced games such as Call of Duty will be run over an instantaneous Bluetooth link. These "twitch" games rely on relatively low latency and constant connections between players to deliver a quality gaming experience and would therefore not work well over GPRS cell phone networks. "Non-twitch" games such as Tiger Woods Golf are turn based and can easily tolerate the lag that would make playing a twitch game excruciating. By linking all N-Gages together through a global network much like the computer game industry does, Nokia will allow players to compete against eachother from nearly anywhere without noticeable lag.

By condensing several devices into one, Nokia hopes to reduce the "device clutter" of the modern consumer's pocket and claim the lead in a heated race for mobile entertainment.

posted by Capa  # 08:48

Flying Car more economical than SUV 

NextFest Inventor Paul Moller has pulled off an astonishing achievement. He's found a parking spot in San Francisco. And we can be grateful for this, because his Flying Car is undoubtedly the draw at the technology exhibition NextFest (here until Sunday, at Fort Mason).

It's just a prototype, but judging by the queues of eager children - of all ages - that clustered around his M400 SkyCar, he has the hit of the show. Moller has spent $200 million and many years of his life on this quixotic venture. We'll share the latest specifications with you.

The M400 needs 35 clear feet to take off but thanks to its 770 hp engine can whiz to 365 mph - cruise control kicks in at 326 mph - and climb at 6,400 feet per minute. You may hear it before you see it: it emits a rather noisy 65 dba at 500 feet. Interestingly, with a fuel consumption of 20 miles to the gallon on the road, it's rather more economical than a Sports Utility Vehicle (SUV) and looks positively eco-friendly compared to a Hummer.

Mirror... signal ... manoeuver

Moller said that today's economics give each M400 a theoretical price tag of around half a million dollars, but in volume production it could drop to $300,000 and in really large volumes to below $50,000. At which point, uh, look out!

Fans of dangerous vehicles may also want to see the EZ-Rocket that graces the outside arena, especially for the very frank safety literature that accompanies it (reproduced here). The EZ-Rocket is a home-made plane that crosses a rocket with a glider - the idea being to get up very fast indeed using an isopropyl alcohol and liquid oxygen rocket. Typical burn-out is within two minutes.

"The pilot can dump the LOX [liquid oxygen] through a manual valve into the atmosphere," we learned. "Venting oxygen behind a 200 MPH glider is not hazardous. We've done this during a safe-abort flight." After drinks and light refreshments had been stowed away, we hope.

Elsewhere at NextFest, children danced on stage with a creepy robot from Honda called Asimo. Asimo looks harmless, has a very lifelike gait but obviously, only a limited range of movements and not very much to say for himself. It's a bit like arguing with a weblogger.

GM showed off a hybrid car, NASA showed off subvocal communications (grinding your teeth will do, thanks to a tiny sensor and the magic of wireless), and a DARPA-funded company showed off their iSwarms. DARPA is obsessed with swarms, because the military - mirroring Japan's long and fruitless obsession with AI - pays them lots of money in the belief that it will give them a competitive advantage. The military wants future wars to be fit for TV, and hopes robots can fight them. Some scientists including Bill Joy fear that nanoscale swarms will eventually swamp humanity but there's a much more immediate problem with the technology: the critters jump into Kevin Kelly's beard, and refuse to come out.

More seriously, Chris "teleportation" Anderson and his team at Wired deserve praise for curating a splendid exhibition. It deserves to be a great success. It runs until Sunday and tickets are $15 a head or $40 for a family ticket. All beside one of the most beautiful stretches of waterfront in the world.

As your reporter departed, San Francisco Mayor Gavin Newsom was praising risk-taking to great cheers from school-children, and Phil Bronstein, editor of the San Francisco Chronicle promised the kids that they could have tomorrow off. The children looked confused. The Schools Superintendent whispered in his ear that since it was Friday, they'd have tomorrow off anyway. Sometimes the future just rolls around so quickly... ®


posted by Capa  # 08:46

Penetration Testing Using Social Engineering (Part 1) 

After my successful social engineering attempt at work, the District Loss Prevention Supervisor asked me if I would do some penetration testing at some of the stores in his district. I made my first attempt today and the following story tells the tale.

All names, places, titles, and work related information have been changed for the sake of security and privacy. The following article is NOT a textbook for stealing/shoplifting. The following article IS a resource for all security personnel to use as a means of training and defense against social engineering.

I decided to work a short day today so I only had time to make my attempts on two stores. I met the District Loss Prevention Supervisor (Charles) at 7a.m. in Middleville and asked him a few questions before I got started. He told me that he and a few of his plain clothed security guys had done this in the past and one of them held the record in the district for getting out the door without getting stopped with a $400 DVD player. I assumed that it must have been a while since that happened if the price was that high. What I said to him next really peaked his interest.

Isreal: "Man, I'm about to walk out that door with $4000 worth of merchandise and I'll stop and talk to a cashier on the way out."

His eyes almost fell out of his head, but the look quickly turned to one of disbelief.

Charles: "OK Isreal, lets try and be a bit more serious about this. I REALLY want to know if my people are doing their jobs."

After trying to get him to place a friendly wager on my prediction, and failing, I headed for the doors. I was wearing a black collared polo shirt and khaki pants. I didn't want to look completely like a bum, but at the same time, thought a shirt and tie would be too much of an advantage for me. I was in the center of middle-class America and wanted to blend in.

I decided I would start off by taking a quick walk around the store just to get a feel for the place, and to see how many employees were on the salesfloor. It seemed like everywhere I turned, a different employee was asking me if I needed any help so I figured I had better make my move quick and get out the door since the plan I had in mind required me to do so.

I walked into the back "employees only" area of the store behind a group (3) of people who looked like they were just arriving to work. I followed one of the girls as she was taking off her jacket so I could take a look at the coat rack. I was hoping to find an employee's work vest hanging around and I wasn't disappointed. I know that most overnighters could care less about taking them home to wash and there were plenty to choose from. I quickly checked through them for a name badge, but wasn't quite as lucky as I was hoping to be so I took the cleanest one I could find and headed for the warehouse.

As I walked down the back hallway, I took quick glances in every room looking for an emply one. I didn't find any so I asked an employee where the breakroom was and headed in that direction. I was trying to find some paperwork that I could carry into the warehouse to use as 'official company documents'. I hit the jackpot when I opened the breakroom door when I noticed that the store had a seperate room for smokers as well, so I decided that I had worked hard enough so far and I deserved a break. After a refreshing dose of a nicotine inhaler I was back on the job. A quick survey of the non-smoking break room turned up a printout of employees who were scheduled to work that day. I knew that Charles wouldn't be happy to know that it was left lying around for anyone to pick up so it was going to serve a dual purpose.

1. The printout would guarantee that Charles would chew out the stores management for letting something like that get out of their site.
2. It would function as the 'official document' that I would need to complete my objective.

I folded up my paperwork and headed for the store's warehouse. I entered the warehouse like I owned the place and walked around until I found the bins that held the backstock for the Electronics Department. I took a quick count of the computers and got the attention of one of the stockmen. His name-badge said James.

Isreal: "James, you got an empty cart anywhere back here? I've gotta take 5 computers over to the store in Vernstown." I patted the 'official' paperwork in my vest pocket so he could see.

James: "I don't have any empty carts right now, but I'll grab an empty pallet and a jack."

James walked off to get what I needed and I started taking computers down from the bins. When he returned, he helped me set them on the pallet and asked me if I needed any help putting them in my truck. I thought about it for a second but decided that I didn't want to get this specific kid in trouble and told him that I could handle it myself and I'd bring the pallet and jack back in a few minutes.

On my way to the front door, I had to take the long way around so I could avoid electronics. As I was walking past the Jewelry Department I noticed an employee heading straight for me. When he headed me off, I read his name badge: Fred 'Assistant Manager'. I stopped the pallet and waited to see what he was going to say.

Fred: "Hey um, (he was looking for my name badge)..."

I looked at my vest and put on a surprised look as I started looking for my lost badge. "I'm Isreal, I must have left my badge in Vernstown"

Fred: "Vernstown? What are you doing here?" He looked at the pallet I was pulling. "Are we TR'ing those to your store?"

I patted the paperwork in my pocket again "Yeah, the ladies in the back got me the paperwork. I'm gonna load these up and head out"

He glanced at my folded up paperwork "Good, you need me to help you with that?" I could tell that he wasn't sincere. No manager likes to do manual labor.

Isreal: "Nah, I got it. Thanks anyway." I started to move with the pallet again so he could have an excuse to walk away... He used it.

On my way out, I saw Charles talking to the ladies at the Customer Service desk. He didn't see me so I kept moving. I stopped long enough to say something about the "crappy weather" to a kid standing by a register and took the pallet and my merchandise out the front doors. I waited outside for about 30 seconds before I realized that Charles never did see me leave so I took out my cell phone and called the store.

Happy Girl: "Hi, thank you for calling Flop-Mart this is Happy Girl how may I direct your call?"

Isreal: "Charles XXXXXX please"

(("Do a little dance, make a little love, get down tonight... get down tonight")) I like that song. Sometimes I wish I could stay on hold longer just to hear a song I haven't heard in a while, but this time I wasn't on hold very long. Charles answered and I told him that I was outside. He laughed and said he'd be right out. His laugh sounded more like a victory cheer and I was really going to enjoy raining on his parade. I hopped up, sat on one of the computers, and waited to see his expression.

I don't think I have ever seen a person's face turn red as quickly as his did. He was OBVIOUSLY angry so I decided it wouldn't be a good idea to gloat about my victory and I settled for telling him exactly how I did it. As I did, I wrote down the prices of the computers and gave him my total take.

$698 x 3 = $2094
$749 x 2 = $1498

Grand Total $3592

CRAP!! I didn't reach my $4000 guarantee. Oh well, it was close enough for me, and it was MORE than enough for Charles. I followed him back inside with my loot and he yelled at a passing person to take it to the warehouse. I took off the vest, set it on the pallet and followed Charles to the manager's office.

I would love to tell you about the ass chewing he gave the store's management team, but he made me leave the room after I told them what I had done. 'Assistant Manager' Fred looked like he was going to puke when I got to his part of the story. I went to the smokers break room and waited for 45 minutes until Charles came and told me we were heading to Vernstown

http://lineman.net/node/view/270
posted by Capa  # 08:39

Introducing social engineering to the workplace 

A while back I decided that I wanted to speak to the Loss Prevention District Manager about social engineering. I was a bit nervous about how it would make me look in the company's eyes if I showed them what I could do. I asked for suggestions in the bbs on how I should approach the company with my concerns. This is the story of what happened.

(As usual I have changed names, places, terminology, etc....)

I spent two weeks pondering every scenario of the conversation I wanted to have with the Loss Prevention District Manager (Charles). I mainly focused on the downside of how I thought the conversation would go. i.e. "Have you done this to the company before?", "Thanks for the info Isreal, I'll be keeping my eyes on you from now on you conspicious bastard." (That one may have been a bit over the top, but I just couldn't get it out of my head)

I called Charles from work one morning and asked if he could stop by the store before I left for the day. I told him that I wanted to discuss a possible security threat to the employees and he agreed to come in and speak to me. He arrived an hour later and we went to the security office to talk. Here's how the conversation went...

(I'm leaving out the beginning of the conversation which consisted of the usual "How have you been?" and other general conversation)

Charles: "So what is this security problem you wanted to talk about?"

Isreal: "Well to start, have you ever heard of something called social engineering?"

Charles: "It sounds somewhat familiar." (He seemed to be thinking hard about the term so I gave him a few seconds before I continued)

Isreal: "Social Engineering is a means by which a person can gain information by use of tricking an individual into freely giving it to them."

Charles still looked a bit puzzled

Isreal: "Let me give you an example. A social engineer could call this store and gain any information they wanted without much trouble. And I'm not talking about hours of operation or anything that is freely given, I'm talking about personal information about the employees of this company. (I said that last part in a very dramatic way)

Charles: "So you're saying that one of these "social engineers" could talk anyone here into telling them anything they wanted to know?"

Isreal: "Yes, and I'd be willing to show you how it's done if you are interested."

Charles: "Even though we are not supposed to give out a person's schedule over the phone, it does occasionally happen. I don't think that it's enough of a problem to get overly worked up about."

Isreal: "Charles, I'm talking about phone numbers, addresses, social security numbers, anything I wanted to know about someone. Would you like it if I called and got all that information on you? I doubt it, and I'm sure you'd be really upset if I used that info to get a credit card and have myself a shopping spree."

(Charles now looked concerned)

Charles: "That doesn't sound too good, but I really don't see how it could be done."

Isreal: "I'll show you in a minute, but first I'll point out that gaining an employees name is extremely easy considering the fact that we all wear name badges. Getting a last name is just as easy by asking another employee the last name of someone you point to and saying "I think I know her, what's her last name?".

He agreed that getting a full name would be fairly easy.

Isreal: "I also want you to not fire anyone I call for giving out the information. (He wasn't very agreeable to that) They are not trained for the tactics I'm about to use on them so it's technically your fault, and I'm pretty sure that I can call any personnel manager and get the information.

That one got his attention fully and he got a determined look on his face.

Charles: "You really think you can do this to anyone?"

Isreal: "The odds are in my favor."

Charles: "Fine, call Mary at 3220 (store number) and see if she passes the test.

I was guessing that Mary has been with the company a LONG time and has probably spent most or all of it in personnel. I smiled a bit at the challenge.

Isreal: "Ok, I'll need you to give me the first and last name of an overnight employee there."

Charles: "Why an overnighter?"

I didn't want to tell him that I have a bit of a fixation with overnight employees.

Isreal: (shrugging) "I don't know... Just the first thing I thought of."

He gave me the name Jackie McGeath. I dialed store #3220. When the girl answered, I told her I was Mark from "home office" and I needed to speak to Mary in personnel. She said "Right away sir" and put me on hold. I thought that was pretty funny and told Charles about it while I waited. He laughed a bit, but looked like he was processing everything at a very slow rate.

Mary: "Personnel, this is Mary. How can I help you?"

She sounded as thought she could be and older woman. I held the phone out so Charles could listen in as well.

Isreal: "Hi Mary, this is Mark in home office. How are you today?"

Mary: "Hi Mark, I'm doing great. We have a warm sunny day for a change so it's pretty nice. What's it like down your way?"

Isreal: "Well, the weathers pretty good today, but things here in the office are not in good shape at all. I'm gonna need your help for a few minutes."

Mary: "What's wrong?"

Isreal: "The guys that take care of the computers are saying that we got one of those viruses that tears up your computer."

Mary: (sounding worried) "OH NO"

Isreal: "I don't really know much about computer viruses, but I do know that some of the words coming out of that office would make a sailor blush."

I laughed and she joined in

Mary: "That sounds awful. I don't know anything about viruses either, but I hear about them on the news all the time. They sound terrible. So how can I help with it?"

Isreal: "Well from what the computer guys are telling me, the virus got in our personnel computers and erased some of the information we had on company employees. They gave me a list of names, and I have to call all these stores and get the information back in our computers. So I'm gonna need you to pull up a Jackie McGeath's information and get ready to answer a few questions. OK?"

Mary: "Sure Mark, anything I can do to help. Is her information still gonna be in my computer or will I need to get out her file?"

Isreal: "I don't have any idea, but just to be safe, you'd better go ahead and get her file to save some time. I still have to call 146 other stores today so my time is a bit limited."

Mary: "OK, I'll put you on hold and hurry up and get the file. I'll be right back."

She put me on hold and I rolled my chair away from Charles to get a good look at his face. He seemed to be in a state of shock. When Mary got back on the line, she gave me Jackie's home address, phone number (with alternate number), social security number, employee ID number, rate of pay, hire date, and number of dependants for tax purposes. I thanked her and hung up the phone.

Charles: "I can't believe that just happened."

Isreal: "That's why I brought it to your attention. I don't want my information getting out just like Jackie's did." (I tapped on the notebook that I had written the information down in)

Charles got a phone call on his cell and wound up having to leave. He said he would be having a meeting with all of the store managers in his district to discuss with them the best way to handle the situation. I told him I would be more than happy to help explain it to the managers if he needed me to. He said I would definitely be at that meeting and he thanked me again for pointing it out to him.

This just goes to show you that your information is not safe anywhere. Most people never think about their personal info being obtained through their jobs, but it can happen. Is information safe anywhere? I'd have to say no.



posted by Capa  # 08:38

Cisco source code stolen?  

A Russian security site is reporting that the source code for the Cisco IOS 12.3 Operating System was stolen. According to the report, some hackers compromised Cisco's corporate network and stole at least 800MB of source code. One of those who allegedly gained access boasted about the break-in and made a 2.5MB snippet of the code available on IRC not long after the alleged break-in.

If true, this could cause big problems not only for Cisco, but for the entire Internet. Cisco routers are responsible for routing much of the Internet's traffic, and the company has long practiced a policy of "security through obscurity." Analysis of the source code may turn up a number of security vulnerabilities which could wreak havoc with their routers. Rolling out patches would be a formidable task, especially given the amount of legacy equipment still in service.

The last major code leak occurred in February when some of the source code to Microsoft Windows NT 4 was leaked. Not a whole lot came of the theft - a vulnerability in Internet Explorer 5.x and not a whole lot else. In this case, if it turns out that the source code for the software that runs Cisco's routers is in circulation, things could get very messy.


posted by Capa  # 08:31

Cell phone block eyed 

Cell-phone use could be blacked out at LAX, the Rose Bowl and Universal Studios under an anti-terrorism plan being formulated by Sheriff Lee Baca and other law enforcement authorities.

Baca is exploring the use of jamming equipment -- already used widely in foreign countries and to protect President Bush -- to interrupt cell-phone signals if a terrorist attack was expected in Los Angeles.

The issue gained urgency after terrorists used cell phones to detonate explosives March 11 in railway bombings in Spain. Baca, who recently returned from a fact-finding trip to Pakistan, said a cell-phone jamming device helped avert the attempted assassination of Pakistani President Pervez Musharraf on Dec. 14.

"We have to look at this very realistically," Baca said. "Public safety is more important than public convenience. We want to take the responsibility head-on and do the best we can, protecting people against terrorist attacks."

Los Angeles Police Department Lt. Horace Frank said the department's bomb squad is very interested in the idea and LAPD Counter-Terrorism Bureau Chief John Miller met with Baca recently to discuss the proposal.

"It certainly sounds like a technology that we would be interested in," Frank said. "But I'm sure there are hurdles we'll have to cross."

Various companies already sell equipment on the Internet that block cell phone signals. The products include jammers that overwhelm cell phone frequencies, systems that mute cell phone ringers and sensors that detect cell phones.

The products range from hand-held jammers costing a few hundred dollars that darken cell-phone signals over a range up to 15 meters, to nearly $10,000 suitcase-sized equipment sold to government and military agencies that can block signals up to several miles.

"You can block a couple of miles or just in the theater," said Bill Vorlicek, vice president of the Emergency Management Group at Kroll Inc. in New York City.

"The military has airplanes that can fly over and block an entire city. A lot of hospitals use them to prevent cell phones from triggering someone's defibrillator. A lot of devices in hospitals are frequency-controlled."

Although Baca's proposal could be useful in protecting the public, critics say the more powerful jamming equipment could create unanticipated problems, such as preventing fire and police personnel from communicating via cell phone or even on their own vehicle radios during an emergency.

"Is the cell-phone jamming equipment a tool? Yes. But it's not the panacea. It's not the silver bullet," Vorlicek said. "The idea has been tossed around for use in New York, but not for anti-terrorism, but in theaters to prevent the annoyance of cell phones going off during a movie or opera."

The cell-phone industry objects to the use of the jammers, arguing that the airwaves are public property and jammers violate the rights of cell-phone users.

Currently, there are 162 million cell-phone users in the United States. In California, more than 17 million people have cell phones and in the greater Los Angeles area, more than half the population sport the fashionable accessory, according to industry figures.

Under law, the importation, sale or use of cell-phone jammers is banned in the United States and can result in Federal Communications Commission fines of up to $11,000 daily per device. An FCC spokesperson said the fines have been levied against people for not holding a license to use the devices.

"The FCC rules are clear," said Travis Larson, spokesman for the international Cellular Telecommunications & Internet Association. "Jamming is illegal, but whether there is an exception made for law enforcement is a decision the FCC will have to make."

An FCC spokeswoman in Los Angeles said they are unaware of any local law enforcement agency in the nation that uses jammers now.

"In an emergency situation, there are different exceptions that could be made," she said. "But that's a decision that would have to come from the headquarters in Washington, D.C."

Currently, the Secret Service uses cell-phone jamming equipment when President Bush travels in his limousine, on Air Force One and when he gives a speech. Casinos use jammers to prevent people from cheating using cell phones and some federal law enforcement agencies use the equipment during hostage situations.

John Mack, chief executive officer of USBX Advisory Services, a Santa Monica-based investment banking firm with a specialty focus on the security industry, said the jammers could have the inadvertent effect of blocking communications between first responders in a terrorist attack.

"Many police, fire department, hazmat units and a whole host of people rely on cell-phone communications and to the extent you use jamming devices designed to jam terrorists, you may be jamming the first responders, whose communication is critical in an emergency situation," Mack said.

He noted that since the terrorist attacks of Sept. 11, 2001, law enforcement and fire agencies have taken steps to develop "inter-operability" equipment that eliminates incompatibility among communication systems.

"In a significant terrorist situation, having all agencies being able to communicate is a huge issue," Mack said. "If every time you think there is going to be a terrorist attack you engage the cell-phone jammers in a five- mile radius, not only are you throwing normal commerce and business into disarray, first responders could be blocked from communicating.

"Sure, you could say that you'll get technology specifically designed to jam only the right kind of cellular frequencies, but first responders use all sorts of different kinds of technology and I don't think you could say that first responders wouldn't be jammed while the stuff terrorists are working with would."

If officials received intelligence that terrorists planned to detonate a bomb at Los Angeles International Airport, he would favor using jamming equipment until a bomb squad could render the explosives safe.

"But every day the LAPD responds to a hundred situations where a water heater blows up or noxious gases are emitted in a car crash. Will we presume those are terrorist threats and engage in cell-phone jamming in a big circumference?"

For cell-phone user Phyllis Hines of Lake View Terrace, Baca's proposal sounds good.

"If it's a matter of saving lives, I think that takes precedent over the right to communicate and I would support something like that," Hines said. "It would seem to take some of the danger out of the times we are living in now.

"But if it became an invasion of our privacy or was overused, there would need to be restrictions placed on it. It can't be used as a general policy. It has to be restricted to emergencies."


posted by Capa  # 08:19

The Goblet Of Fire 

Tuntas sudah perburuan mencari pemeran Cho Chang,
pacar Harry Potter dalam film keempatnya, The Goblef Of Fire. Cewek
tersebut berhasil ngalahin 4000an cewek yang terdaftar!

Adalah Katie Leung, cewek yang beruntung banget ngedapetin kasting
sebagai Cho Chang, gebetan Harry Potter di filmnnya yang keempat.
Cewek berumur 16 taun ini didapatkan produser film tersebut setelah
menyeleksi lebih dari 4000an cewek ABG yang mendaftar jadi pemeran
pacar Harry tersebut.

"Dia sangat takjub dengan hal ini dan nggak sabar untuk menjadi
bagian dari keluarga Harry Potter, "ungkap Peter, bokap Katie pada
Daily Record. Dalam waktu dekat, Katie akan mengeluarkan komentar
resmi atau sejenisnya pada publik. Di film keempat Harry Potter, The
Goblet Of Fire ini, Katie juga akan dapet adegan dicium sama Daniel
Radcliffe, si penyihir cilik yang kesohor itu!

Syuting nya baru mulai akhir taun ini. Sambil nunggu, nonton aja
dulu film Harry Potter ketiga, Prisoner Of Azakaban yang akan rilis
4 Juni nanti!

posted by Capa  # 08:18

5/13/2004

Secrets of the stealth ship  

A stealth ship - one invisible to enemy radar - may sound like the stuff of a James Bond film, but the maritime equivalent of the US air force B2 bomber is undergoing weapons installation at a naval shipyard in the south of Sweden.
According to the Swedish navy, the first of the Visby Class corvettes, which is currently sitting in the naval dockyard in Karlskrona, is a completely new type of warship: a frigate that is lighter and faster than a conventional ship and almost invisible to enemy detection. It is the largest vessel ever built from carbon fibre - a super-hard, lightweight plastic - which also marks a breakthrough in shipbuilding materials. The last time this happened - you could argue - was when Isambard Kingdom Brunel switched from wood to steel with the SS Great Britain in 1843.

Sounding more like an Ikea sofa than a warship of the future, the Visby is being primed to patrol Sweden's territorial waters and participate in joint operations within the EU and UN task forces. The ship, the first of five on order for the Royal Swedish Navy, will have a crew of 43 (including 16 conscripts) and will go into operation in January next year.

The Visby weighs approximately 600 tonnes, about half as much as a conventional corvette, and features a hangar for an Agusta-Westland helicopter, which can land on the upper deck and be retracted into the hull. The Visby's 57mm cannon also retracts so as to not to spoil the ship's radar signature. The Visby is designed for anti-submarine warfare and can sneak up on the enemy and plant anti-submarine mines without being seen.

The Royal Swedish Navy began searching for a material for a stealth ship in the immediate aftermath of the cold war.

"All of our exercises and training during the cold war period was a matter of stopping an enemy from the other side of the Baltic," says Lieutenant Commander Ulf Öberg of the Swedish navy. "All the Baltic states are now in the European Union and the Russian navy is not so much of a threat anymore. We no longer need the big ships."

The Swedes decided to switch from steel to plastic - two layers of carbon fibre filled with a PVC-like foam - in the search for a radar resistant material. By using a composite material, they found one that could dramatically reduce a ship's signature, making it not only less detectable by radar, but also less prone to enemy mines and other forms of electronic detection such as infrared. And if it is detected, the Visby should be quick enough to escape as it is only half as light as a conventional corvette.

Moreover, in searching for a radar-resistant material, the Swedes seem to have stumbled across a technology that could offer improved strength and rigidity, lower weight and better shock and flame resistance than steel. Kockums, the ship's builder, says ships made from carbon fibre enjoy lower running and maintenance costs and lower fuel consumption.

According to Kockums, the Visby costs roughly one and a half times more to build than a conventional corvette. But the shipbuilder argues that the Visby is a far more cost-efficient vessel over the long run
"Carbon fibre is not a cheap material - that's the trouble," admits Kjell Göthe, head of information at Kockums. "But if you look at the ship over the course of 30 years and you look at all the costs it is cheaper than a steel ship. The maintenance is nothing to talk about."

Carbon fibre is one of the toughest known materials - and that is why it is so expensive. It is so tough that Kockums had to develop the cutting technology to build the Visby. "We had diamonds in the beginning but they were destroyed after a very short time," says Göthe. "What we use now is an extremely high pressure water jet. I think it is a bit incredible but a water jet is better."

The Visby's stealth properties are not its only hi-tech component. The ship includes a command and control centre that uses a Windows NT operating system. The Swedes insist that this will not make the vessel vulnerable to hacker attacks, although the navy will not be drawn on the potential for the system - armed with hi-tech cannon and missiles - to crash. While the point-and-click system is popular with conscripts, the ship was fitted with a wooden ship's wheel at the insistence of senior officers. If Windows goes down, they will still be able to steer.

Racing yachts and patrol boats have been manufactured from composite materials before, but the Visby is the largest ship to be made from carbon fibre. It could be a little early to talk about new trends in shipbuilding as the Visby has only recently finished undergoing sea trials and won't be fully operational until January, but US shipbuilders including Lockheed Martin, General Dynamics Corp and Raytheon are also designing similar stealth ships for the Pentagon. The next generation of US destroyers, the DDX, is also reported to be built using composite materials and the Royal Navy is believed to be looking at carbon fibre as a potential shipbuilding material. If the Visby really does turn out to be more cost-efficient than a steel ship, some maritime analysts believe that it could be a matter of time before merchant vessels begin to be made from tough plastics.

"The use of composite materials is very exciting," says Stephen Saunders, editor of Jane's Fighting Ships. "There is no reason why ships should not be made of carbon fibre as long as they are up to the job. The fact that the Americans are using it in the superstructure in their next destroyers certainly points in that direction."

For now, the Visby is the lightest and fastest in its class. But is it the only one? Ominously, the Guinness Book of Records museum in Florida says there could be another, much larger stealth ship already out there. They just don't know how to find it.



posted by Capa  # 10:52

TIPS UNTUK MEMASAK  

MENGGORENG.

Agar gorengan kita tidak lengket/melekat di penggorengan. Ada baiknya
dipanaskan dulu penggorengan itu sebelum memasukan minyak goreng. Dan tunggu
sampai minyak dipenggorengan itu panas barulah mulai menggoreng.

MEREBUS

Agar lebih enak rasa daging atau sop yang kita buat. Lebih baik tunggulah
sampai air mendidih dulu, dan bergolak selama kurang lebih 1 menit.
barulah masukan daging yang akan kita rebus.
Karena merebus daging dengan memasukan daging itu kedalam air yang masih
dingin, maka segala cairan dari daging itu akan menyebar keseluruh air yang
dingin itu. dan bisa mengurangi rasa enak bahkan menimbulkan rasa amis pada
masakan itu.
Sedangkan bila memasukan daging kedalam air mendidih, maka belum sempat cairan
dari daging itu menyebar, sudah terlebih dahulu dimatangkan oleh air mendidih
itu.

SAYURAN GADO GADO ATAU PECEL.

Untuk menjaga vitamin dari sayur sayuran itu tidak terbuang percuma, sebaiknya
janganlah direbus. Akan lebih baik di kukus.

MEMELIHARA HASIL GORENGAN

Sering kali kita menggoreng ikan, saat bagian atas habis dan saat kita
membalik bagian bawahnya, terlihat basah dan kurang sedap dipandang.
Ada baiknya kita meletakan sesuatu di atas piring yang bisa membuang udara
panas dan tembus tetesan minyak pada ikan yang telah kita goreng itu. Agar
bagian lainnya dari ikan itu tetap sama dengan bagian lainnya dan enak
dilihat dan dirasakan, juga akan memelihara ke garingan dari ikan itu. Hal
semacam juga bisa digunakan pada gorengan bertepung. Alat lapisan yang mirip
jaring (tirisan) itu bisa di dapatkan di pasar pasar traditional maupun super
market besar.

MENGETAHUI HASIL REBUSAN ATAU BAKARAN

Bila ingin mengetahui sudah matang atau belumnya daging ayam atau daging
lainnya bila kita rebus atao bakar. Adalah dengan cara dengan menggunakan
tusukan sate atau tusuk gigi bisa juga dgn lain nya yang serupa.
Yaitu dengan cara tusukan alat itu pada daging yang sdg kita rebus atau bakar,
bila yang keluar cairan masih berwarna kemerahan, berarti daging itu belum
matang sempurna. Bisa dikatakan sempurna apabila cairan yang keluar itu
berwarna putih.

MENUMIS SAYURAN

Bila kita menjamu tamu yang datang berkunjung, janganlah berlama lama sayuran
itu di penggorengan, karena akan terlalu layu dan mengurangu rasa asli dari
sayuran itu. Juga kurang bagus dilihat bentuk sayur itu.
Agar terlihat dan terasa asli sayuran yang kita tumis itu, lebih baik sayuran
itu hanya 3/4 matang di penggorengan. Sewaktu membawa kemeja tamu tutuplah
dengan rapat, maka ketika di buka sayuran itu akan matang dengan sendirinya
selama waktu dari dapur anda ke meja ruang makan anda.

MEMELIHARA MAKANAN DI LEMARI ES

Janganlah memasukan semua belanjaan anda dalam satu kantung utuh kedalam
lemari es. Bila anda membeli daging satu kilo, padahal anda tidak akan
memasaknya dalam satu kali. Sehingga anda harus mengeluarkan dan memasukan
lagi daging itu ke dalam lemari es setelah anda ambil seperlunya. Semua itu
dapat mengenmbang biakan kuman kuman dalam daging itu. Karena kuman kuman itu
tidak akan mati walaupun anda masukan kedalam ruang terdingin sekalipun. Dan
kuman kuman itu akan berlipat ganda setiap kali anda keluarkan dari lemari es
itu.

Ada baiknya anda bagikan daging daging itu sesuai dengan kebutuhan anda setiap
memasaknya, dan masukan kedalam kantung plastik daging sebanyak yang anda
perlukan saja. Jadi anda akan mengeluarkan daging sesuai dgn keperluan anda.
Hal ini berlaku juga dengan sayuran dan lainnya.

Makan sisa yang sudah matang, sebaiknya ditutup rapat bila dimasukan kedalam
lemari es, hal ini akan melindungi kuman kuman dari makanan lain yang masih
mentah masuk kedalam makanan matang itu.


posted by Capa  # 10:46

tau ahhhhhhhhh  

Built-in 8 MB memory stores thousands of contacts, appointments, to-do items, and notes
New, advanced monochrome LCD screen makes it easier to see in dim light and in bright sunlight
New Secure Digital Card/MultiMediaCard expansion slot for additional memory and functionality such as a dictionary/thesaurus, games, and more
Native USB cradle allows faster HotSync operations
Windows and Macintosh compatible--includes desktop software for both platforms
posted by Capa  # 10:13

5/04/2004

When hi-tech meets high fantasy  


When hi-tech meets high fantasy
By Mark Ward
BBC News Online technology correspondent

Whether you like the three Lord of the Rings films or not there is little doubt that they are a triumph for technology.
Running the huge technological resources behind the films was Weta Digital, a firm formed by Rings director Peter Jackson and others in 1993 to do the effects for the Heavenly Creatures movie.

Back then Weta had only one computer, which it leased, to do special effects work.

Now it runs the third largest supercomputer on the planet if you count the number of processors, 3300, it can call on, says Scott Houston, chief technical officer at Weta.

The ones that beat Weta are the Japanese Earth Simulator (5120 processors) and Los Alamos National Laboratory's supercomputer (8192 processors).

Big database, big problems

The reason Weta's data centre in Miramar New Zealand is not on the Top 500 supercomputer list, said Mr Houston, was because of the way computing power is calculated for those rankings.

The Weta executive was in London as part of a project to promote New Zealand as a place to find skilled technology workers and get programming jobs done.

Weta, said Mr Houston, was a standard bearer for what was possible.

"We have done some remarkable things," he said.

By any measure the amount of data prepared and processed for the movies is staggering.


Weta's data store is 500 terabytes in size spread among 220 million files.
Some of that data is a few years old because some sequences, such as the Balrog from the Mines of Moria, appeared in more than one film.

Finding and moving the data for that sequence out of storage so it could be reworked for the second film took about three days.

A database of that size takes a lot of looking after.

Currently Weta is working on better ways to archive and organise it so that it can potentially be re-purposed for other projects.

This work is needed, said Mr Houston, because the current set up means that it would take months to recover from a double drive failure in one of its disk stores.

But most of the data is from the final movie, The Return of the King, which had more than 1500 special effects shots in it. By contrast the first movie had only 400 and the second 900.

Battle to build

One of the longest special effects sequences was the Battle of the Pelennor fields that took place in front of Minas Tirith.

The battle pitted 120,000 digital orcs, each with its own AI fighting style and armour against 8,000 digital Riders of Rohan.


It was also almost the sequence that derailed the entire picture.
In mid-August last year, Mr Houston had to work out how long it would take to prepare this sequence for the finished film with the resources they had.

He came back with an estimate of 347 days. Given that the immovable release date for the final film was 18 December, that was a few hundred days too long.

"There was never a question of putting any barriers in the way to Peter Jackson's vision," said Mr Houston.

Instead they just had to get more computers, even though Weta's four data centres were chock full of machines at that point.

"We needed another 1,000 processors and we had nowhere to put them," he said.

The answer was to build another data centre nearby, lay a 10gigabit per second cable to it to connect it to the other four and ask IBM to set up a production line just to build the computers Weta needed to stock it.

The result was that within two weeks the new data centre was finished and helping prepare the battle for the big screen.

Future projects

Since then it, and other Weta resources, have been used for effects in the forthcoming I, Robot movie and will help with future releases such as The Lion, The Witch and the Wardrobe.


For future productions that suddenly need more processing power Mr Houston wants to do things differently.
"We are a real peaks and troughs business," he said.

Much better would be to use a Grid-type approach that lets Weta call on processing power where-ever it is and when it needs it.

"I do not want to have to build the computer room in two weeks again," he said.

It is likely that Weta will have to call on more processing power than it has as its disposal.

"I know my boss and he's not going to be stopped," said Mr Houston. "He has been totally vindicated by the success of Lord of the Rings."

"King Kong is going to be bigger," he said.

He is confident of this, even though King Kong only has one, albeit big, monster and many sequences in Lord of the Rings featured hundreds of thousands of them.

"King Kong is covered in hair," he said, "we could be animating that."

Story from BBC NEWS:
http://news.bbc.co.uk/go/pr/fr/-/2/hi/technology/3672887.stm

Published: 2004/04/30 10:31:45 GMT

© BBC MMIV

posted by Capa  # 09:24

5/03/2004

walah 

http://www.gbagod.com/catalog/product_info.php?products_id=93


BARU! Memainkan video & musik serta membaca e-book di GBA(SP)!
GBA (SP) Movie Player membuat anda dapat menggunakan Game Boy Advance (SP)
untuk memainkan file video dan musik, atau sebagai e-book.
Software yang disertakan dirancang untuk mengkonversi file video dan audio
ke format file .gbm atau .gbs, software juga mendukung file Windows Media
Player dan Real Player yang membuat konversi jadi sederhana.
File yang telah dikonversi dapat disimpan ke Compact Flash memory card
biasa. Cukup tancapkan memory card ke GBA (SP) Movie Player dan anda dapat
menonton video, mendengar musik atau membaca e-book!

Fitur:
* Disertakan dengan software untuk mengkonversi segala format video dan
musik Windows Media Player ke format GBA.Daftar file yang didukung saat ini
adalah: AC3, WAV, MP2, MP3, RA, RM, RAM, RMVB, MPEG, MPG, M2V, AVI, ASF,
WMA, WMV, DAT.
* Menggunakan segala ukuran Compact Flash sebagai media penyimpan.
Setelah file dikonversi di PC anda, cukup copy ke CF card dan adapter ini
akan memainkannya di GBA. Adapter juga mendukung folder untuk memudahkan
menyortir/menyimpan isi multimedia.
* Bergantung pada pengaturan kompresi, sekitar 60 menit video dan audio
dapat disimpan dalam sebuah 128MB CF card.
* Dapat menampilkan e-book dalam format text standar (*.txt).

posted by Capa  # 13:23

5/02/2004

walah 

grrh
posted by Capa  # 23:50

text 

text
posted by Capa  # 23:44

5/12/2002

testttt
posted by Capa  # 11:26

Archives

05/12/2002 - 05/19/2002   05/02/2004 - 05/09/2004   05/09/2004 - 05/16/2004   05/16/2004 - 05/23/2004   08/08/2004 - 08/15/2004  

This page is powered by Blogger. Isn't yours?