Monday, October 27, 2008

Metal Slug Arcade?

Well, at the very least an emulator is needed in order to play games on arcade platforms. Not quite the case for this game below- 'Commando 2' is a Metal Slug look-alike, but delivers easier game play while challenging the player to think on-the-go. Basically, it's not all just about dodging the incoming projectiles. Hosted on miniclip.com, you can now shoot your way to __________!(Fiil in the blank)



Games at Miniclip.com - Commando 2Commando 2

Our Hero continues the battle with more missions, more enemies and bigger artillery.

Play this free game now!!

Thursday, October 23, 2008

Back Online!

This post focuses on laptop tips:

It's been a long, but short holiday for me... Boredom followed after my Ferrari(laptop) hard disk 'crash'. Well seriously, this experience has taught me to exercise extreme caution when using 3rd party software, at the tragic cost of much downtime. Apart from that, I did realise a number of loopholes in my laptop routine that should be rectified.

Alright, here are my thoughts:
1.Warranty
Best Practice:
Do not hesitate to extend your laptop warranty from the usual 1 or 2, to 3 years or longer- this will prove to be a saving grace should there be any abnormality or malfunction. In fact, the insurance that you're purchasing will definitely pay off, considering how laptops usually crash after 1½ years of usage. Did you know that replacing a laptop's hard disk(the part itself + labour fee + GST) at a service centre easily soars beyond the cost of warranty extension for a year?

The Math:
Equation A: 1 X Hard Disk replacement cost > 1 Year Warranty Extension
Equation B: 1 X Hard Disk replacement cost >= 2 Year Warranty Extension
*Whereby the 'cost' includes GST, labour fee, transport(taxi, courier etc.) and the replaced hard disk- easily costing $300 to $400. Furthermore this calculation assumes your laptop crashes at such a scale only once.

2.Backing Up Files
Best Practice:
Backup important files once in every few days, or when there is a huge project progress made during the day. Backup files should not only be stored in the hard disk of your laptop, but at least on 1 other removable device(thumbdrive, portable hard disk etc.).

3.Security Software
Best Practice:
Choose reliable software that utilises and manages system resources well- resource hogging software not only contribute largely to lag, but potentially to hardware overheating(if laptop cooling methods are inefficient).

What Do I Mean?:
Basically, if one uses a great anti-virus/anti-spyware/firewall(NOT WINDOWS FIREWALL) that is able to detect and address threats at a rate of >=95%, but at the cost of severe paranoid-like system monitoring(by the firewall): the security and insurance yielded at the primary cost of likely system lags are disadvantageous.

4.Care & Maintenance
Well, it's commonly stereotyped that ladies are way better at keeping things precious, this I would agree. But in the context of computers, it's the hardware/software know-how that defines 'maintenance'. A pretty laptop chassis per se, dosen't necessary mean a 'well-maintained' laptop.

This sentence officially concludes my first post after such a long downtime from blog posting, thanks for reading! =)

Monday, August 18, 2008

Wireless Router Security

(This post is pending for completion)
Disclaimer
(COMPULSORY TO READ & UNDERSTAND)

Under the Singapore Statutes, Computer Misuse Act Chapter 50A:

*Section 6: Unauthorised use or interception of computer service-
Any person who knowingly secures access without authority to any computer for the purpose of obtaining, directly or indirectly, any computer service shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.

*Section 7: Unauthorised obstruction of use of computer-
Any person who, knowingly and without authority or lawful excuse interferes with, or interrupts or obstructs the lawful use of, a computer; or impedes or prevents access to, or impairs the usefulness or effectiveness of, any program or data stored in a computer, shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.

It's come to my realisation that many Wireless users severely neglect the security of their Wireless Routers, leaving boundless vulnerabilities to hacker attacks. In this post, I'll discuss the various security loopholes in default router configurations. Building upon which, I'll explain how to implement stringent router security, using all available router features.
(To Be Continued...)

Tuesday, July 8, 2008

July 8 Updates

New Updates
-Revised labels of all posts, making them more reader-friendly
-Implemented labels for a navigation-friendly experience to locate my posts

Revisions
-Revised July 5 Updates with navigational links

-Liked Computer Security 2: Deploying 3-Tier Defence Phase 5 mention of Ad-Aware, to my Ad-Aware vs Spybot S&D Post

Saturday, July 5, 2008

July 5 Updates

New Updates
-Completed File Sharing Post
-Completed Routers 101 Post

Revisions
-Added links to link-up Computer Security 1&2 posts

Sunday, June 22, 2008

June 22 Notice

As of tomorrow, I'll be returning to school life.. Recently I'm extremely busy dealing with all the projects at hand, I do apologize to you guys for my inability to make detailed posts the last few rounds. Please do allow me some time to iron out my schedule. Don't worry though, I do frequently add pictures, revise my posts etc. If you do notice anything that needs improvement, do post it at the comments tagbox.

Saturday, June 21, 2008

File Sharing

Alright, this post on File Sharing is as requested by 'baldbubba'. In which, I'll venture into one of the grey areas of the Internet.

About File Sharing
File sharing in Internet context is the act of 'sharing'/propagating on-demand data through any form of Internet medium(e.g. Instant Messaging).

Common File Sharing Mediums
Briefly Ranked:
1-Torrents
2-File Hosting Sites
3-Instant Messaging
4-Forums
5-Email

File Sharing Security
Basics
Use a 3-tier defence structure to help prevent any form of malicious attacks that may originate from the downloaded file. Click on the underlined links to learn more.

Protection
-Privacy
If you're concerned about your privacy- especially when torrenting, check out your software for privacy features such a uTorrent's 'Protocol Encryption' etc..


Note
Support: Additional information will be posted should I make any new discoveries