Wednesday, 2 March 2011

Software Attacks

Software attacks have been occuring in which malware(malicious software) tried to infect as many computers worldwide as possible to get the profit. Cybercriminals are heavily involved with malware attacks to make money and they use complicated attacks typically via the Internet. There are variety of software attacks.
(1) Virus - Sehment of computer code that performs malicious actions by attaching to another computer program.
(2) Worm - Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another program).
(3) Trojan Horse - Software programs thar hide in other programs and reveal their designed behavior only when they are activated.

(4) Back Door(Trap Door) - Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.

(5) Logic Bomb - Segment of computer code that is embedded with an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
(6) Password Attack Dictionary Attack - Attacks that try combinations of letters and numbers that are most likely to succeed, such as all words from a dictionary.
(7) Brute Force Attack - Attacks that massive computing resources to try every possible combination of password options to uncover a password.
The following picture is DES(Data Encryption Standard) cracker circuit board fitted with several deep crack chips which could brute force a DES key in a matter of days:



(8) Denial-of-Service Attack - Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.
(9) Distributed Denial-of-Service Attack - An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots (which form a botnet) to deliver a coordinated stream of information requests to a target computer, causing it to crash.
(10) Phishing Attack - Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
(11) Zero-day Attack - A zero day attack takes advantage of a newly discovered, previously unknown vulnerability in a software product. Perpetrators attack the vulnerability before the software vendor can prepare a patch for the vulnerability.



Porter’s Five Forces

The Porter's 5 Forces tool is a simple but powerful tool for understanding where power lies in a business situation. This is useful, because it helps you understand both the strength of your current competitive position, and the strength of a position you're considering moving into.
With a clear understanding of where power lies, you can take fair advantage of a situation of strength, improve a situation of weakness, and avoid taking wrong steps. This makes it an important part of your planning toolkit.
Conventionally, the tool is used to identify whether new products, services or businesses have the potential to be profitable. However it can be very illuminating when used to understand the balance of power in other situations.

Understanding the Tool:

Five Forces Analysis assumes that there are five important forces that determine competitive power in a business situation. These are:
  1. Supplier Power: Here you assess how easy it is for suppliers to drive up prices. This is driven by the number of suppliers of each key input, the uniqueness of their product or service, their strength and control over you, the cost of switching from one to another, and so on. The fewer the supplier choices you have, and the more you need suppliers' help, the more powerful your suppliers are.
  2. Buyer Power: Here you ask yourself how easy it is for buyers to drive prices down. Again, this is driven by the number of buyers, the importance of each individual buyer to your business, the cost to them of switching from your products and services to those of someone else, and so on. If you deal with few, powerful buyers, then they are often able to dictate terms to you.
  3. Competitive Rivalry: What is important here is the number and capability of your competitors. If you have many competitors, and they offer equally attractive products and services, then you'll most likely have little power in the situation, because suppliers and buyers will go elsewhere if they don't get a good deal from you. On the other hand, if no-one else can do what you do, then you can often have tremendous strength.
  4. Threat of Substitution: This is affected by the ability of your customers to find a different way of doing what you do – for example, if you supply a unique software product that automates an important process, people may substitute by doing the process manually or by outsourcing it. If substitution is easy and substitution is viable, then this weakens your power.
  5. Threat of New Entry: Power is also affected by the ability of people to enter your market. If it costs little in time or money to enter your market and compete effectively, if there are few economies of scale in place, or if you have little protection for your key technologies, then new competitors can quickly enter your market and weaken your position. If you have strong and durable barriers to entry, then you can preserve a favorable position and take fair advantage of it.
These forces can be neatly brought together in a diagram like the one below:




click on : 
http://www.mindtools.com/pages/article/newTMC_08.htm

H.i.d.d.e.n

you might not noticed before that there are several logo that contains hidden messages. here are some example of the logo. 
Fedex
fedex
This is probably one of the best known logos with a hidden meaning. If you look closely, you’ll see an arrow that’s formed by the letters E and x. This arrow symbolizes speed and precision, two major selling points of this company.
Toblerone
toblerone
Toblerone is a chocolate-company from Bern, Switzerland. Bern is sometimes called ‘The City Of Bears’. They have incorporated this idea in the Toblerone logo, because if you look closely, you’ll see the silhouette of a bear.
Baskin Robins
baskin-robbins
The old logo of Baskin Robbins had the number 31 with an arc above it. The new logo took this idea to the next level. The pink parts of the BR still form the number 31, a reference to the 31 flavours.
Roxy
roxy
Roxy is a company that specializes in clothing and accessories for girls who love snowboarding, surfing… The company is actually a part of Quiksilver. The Roxy logo is made of two Quiksilver logos that form a heart.
ormula 1
formula1
At first, this logo might not make much sense. But if you look closely, you’ll see the number 1 in the negative space between the F and the red stripes. I also love how this logo communicates a feeling of speed.

m.y.s.e.l.f....

My name is Sharipah Hafida Binti Syed Noor Mohd Noor. I live in Taman Kosas, Ampang. I am a very simple person. I love food, especially tomyam. but now I really like to eat yong tau foo n coconut shake since I was studying in Melaka. heeee ... My favorite color is blue because I think it is very beautiful color.


I went to school in Sekolah Rendah Kebangsaan Taman Keramat (2) starting from standard 1-6 . I also went to school in the Sekolah Rendah Agama Datuk Keramat. After the UPSR, I went to Sekolah Menengah KebangsaanTaman Keramat (SMART) from 1-5. after SPM, I had attended English language courses at the Institute of SAL, which is located at Masjid Jamek for three months. After a few months, I have been offered to continue my studies at Kolej Poly-Tech Mara, Bangi in Diploma in Banking. After the completion my diploma, I'm continue my studies at UiTM Kampus Bandar Melaka  in BBA (Hons) Human Resource.


I have a very happy family. My father name is Syed Mohd Noor Bin Syed Berahim. My mother name is Sarimah Binti Samawi. I have three sibling and i'm a youngest. I have a twin brother and sister. My brother's name is Syed Mohd Hafiz and my sister's name is Sharipah Noor Hafiza.They are 23 years of old.


 my lovely Abah & Ummi


 my bro, Apis


 my sis, Eija


me, adik

I thank to ALLAH to have been born in this family. I have parents who really understand their children and very loving. I love them so much...!!!!

Before I forget, I will get another new members in my family. He is my future brother in law. God willing, during this June, my sister is getting marry to Mohd Badrul Hisham Bin Zakaria from Kelantan. I am very excited to get new family member.



my sis n my future bro-in-law


Tuesday, 1 March 2011

s.t.r.e.s.s

What Is Stress?

Stress is a feeling that's created when we react to particular events. It's the body's way of rising to a challenge and preparing to meet a tough situation with focus, strength, stamina, and heightened alertness.



The events that provoke stress are called stressors, and they cover a whole range of situations — everything from outright physical danger to making a class presentation or taking a semester's worth of your toughest subject.
The human body responds to stressors by activating the nervous system and specific hormones. The hypothalamus signals theadrenal glands to produce more of the hormones adrenaline and cortisol and release them into the bloodstream. These hormones speed up heart rate, breathing rate, blood pressure, and metabolism. Blood vessels open wider to let more blood flow to large muscle groups, putting our muscles on alert. Pupils dilate to improve vision. The liver releases some of its stored glucose to increase the body's energy. And sweat is produced to cool the body. All of these physical changes prepare a person to react quickly and effectively to handle the pressure of the moment.
This natural reaction is known as the stress response. Working properly, the body's stress response enhances a person's ability to perform well under pressure. But the stress response can also cause problems when it overreacts or fails to turn off and reset itself properly.



Good Stress and Bad Stress

The stress response (also called the fight or flight response) is critical during emergency situations, such as when a driver has to slam on the brakes to avoid an accident. It can also be activated in a milder form at a time when the pressure's on but there's no actual danger — like stepping up to take the foul shot that could win the game, getting ready to go to a big dance, or sitting down for a final exam. A little of this stress can help keep you on your toes, ready to rise to a challenge. And the nervous system quickly returns to its normal state, standing by to respond again when needed.



But stress doesn't always happen in response to things that are immediate or that are over quickly. Ongoing or long-term events, like coping with a divorce or moving to a new neighborhood or school, can cause stress, too.
Long-term stressful situations can produce a lasting, low-level stress that's hard on people. The nervous system senses continued pressure and may remain slightly activated and continue to pump out extra stress hormones over an extended period. This can wear out the body's reserves, leave a person feeling depleted or overwhelmed, weaken the body's immune system, and cause other problems.




for more information, click this link: http://kidshealth.org/teen/your_mind/emotions/stress.html

dine in

i almost forget to post about the place which i went for dinner last 2 weeks. It's called Restoran Seri Percik, located near Malim Jaya. You should try to dine in there. The place is awesome and the food, is del.ic.ious.That was my first time me and my friends eat there. food prices are very reasonable and the food is delicious .the restaurant also provides western food as well as east. food suitable for all groups regardless of the young and the elderly. it is also very interesting place and has a beautiful decor. the place is also fun to look for is located behind to the road.




my housemate: fana..sarah..me..didie


ayam percik


special fried rice with ayam percik


paprik fried rice


nasi lemak with ayam perci

This is the food that we ordered to fill our stomach for dinner. should you want to try it too right ??... I know .. so what are you waiting for ??... you must try ... I guarantee you will feel satisfied when eating foods that are nice.


and one that I forgot to share with you all ... coconut shake ???..... what ???.... there  among you must be wondering what actually is coconut shake .. coconut shake is a drink made from coconut and palm kernel are blend together with vanilla ice cream .. there must be among you who feel strange .... right ??... hmmm .. this is the coconut shake...

delicious coconut shake

hmmm.....yummy...!!!!

enjoy...!!!

The most pleasant place to enjoy the coconut shake is in Klebang. many visitors who come to enjoy coconut shake  all races Malay, Chinese and also India .. yeayy .... we are all 1 MALAYSIA ...you should try because not every place is selling coconut shake ...so .... what are you waiting ???..... you should try it now ....!!!!!