Its kinda late to say Merry Christmas so I’ll greet advance Happy New Year to all!!!
Its been a long time since my last post. I went to Quezon province (Quezon Del Sur to be exact :-p ) to spend my Christmas with my family. I’d like to share my Christmas experience… the Mastercard way:
Crisp bills and coins for the Christmas giveaways …………………… PHP 8500
Tire Change (x2) in preparation of a long drive ………………………. PHP 4200
Change Oil and Tune up ……………………………………………………………… PHP 2200
Last minute replacement for Auxillary Fan…………………………………. PHP 1600
The excitement and smiles of my nephews and nieces during our Family Christmas Party………………………….. PRICELESS
The thank you’s from kids, manangs and lolas after our Christmas gift-giving ……………………………………….. PRICELESS
I’ll post some pics later.
I’m glad that my father “reimbursed” a large percentage of the money that I used to change the new/crisp bills 🙂
I always thought that Barack Obama is distancing himself with GMA, but I guess I was wrong. The video report below tells us that President-Elect Barack Obama sneaked into Malacañang, Manila over the weekend to have coffee with Madam Gloria Macapagal Arroyo.
I finally got permission from Computerworld Philippines to post here the article that we submitted for their Viewpoints column. I am already tinkering with the WordPress post/edit stuffs, but upon checking their site today, they already posted it on their online portal 🙂 I’m posting some snippets of the article below:
Web Security Lifeline: In-the-Cloud Technology Beats Malware Pollution
By Menard Oseña
Published in the November 2008 print edition of Computerworld Philippines
December 18, 2008
The State of Threats
Often, to impress upon the public the kind of dangers lurking online, security vendors struggle to pin a number on the volume of new malicious codes that are being produced everyday. AV-Test.org, an independent antivirus tester, placed it at 650,000 unique samples a month, an incredible jump from roughly 50,000 a month in 2005. We are seeing the same thing along with other AV (antivirus) vendors, although the number may differ among companies. The bottom line is that the numbers are indeed growing at an alarming rate.
Alongside the volume problem is the nature of these threats. Malicious codes these days no longer announce their presence on computers. The days of global outbreaks like the ILoveYou virus are over. They now operate stealthily, sitting unknowingly in computers to perform cybercrime. They can siphon personal and sensitive information from computers. They can hijack PC computing power for large-scale online attacks that can take down sites for hours. These threats are collectively known as Web threats and they are characterized by the smaller and targeted nature of their attacks, with money often the sole motivator.
AV Vendors Fight Back
In pattern matching, AV vendors use different sourcing strategies to obtain the file plaguing customers. We look for the marker or the unique thumbprint of the file and program a malware definition that can detect it, an activity we can now automate with the use of technology, making it an effective way of battling malware. But doing this for every single sample that we obtain will eventually consume too much computing power, making the user experience suffer as a result.
Quite different from pattern matching, heuristics involves the collection of a vast number of malware samples. Engineers create rules based on an analysis of common malware behavior and characteristics. Heuristic patterns detect not only all existing variants similar to the malicious code that was analyzed, but also future variants. This technique, however, although generally considered to be less resource-intensive, requires a safety net to be in place as it is more prone to false detection.
In-the-Cloud* is the Way to Go
Looking at the big picture, however, these strategies ultimately fall short. Detecting threats at the gateway and at the endpoint, after all, requires that a threat already be present on the system. In an ideal world, threats are detected and blocked at the source. Instead of the messy file-based battle, AV vendors must figure out a way to deliver protection at all possible fronts.
In today’s attacks, the infection chain begins long before a file is downloaded. Malware writers, for instance, can entice users via social engineering to click on a malicious URL. This can happen via spam or an instant message or even as part of the search results of a legitimate search engine. The URL can lead to several redirections which in the end causes the PC to download a malicious file. This means there are actually several chances to cut off the infection chain before a file ever gets to perform its payload. In addition to detecting files, this new level of protection must filter out fraudulent mail and block malicious URLs, bringing users farther away from the risks of these sneaky Web threats.
Going in the cloud for Trend Micro means “setting up camp” on the Internet and installing lighter-weight clients on user PCs to block threats before they ever reach the corporate network. This move likewise presents several pluses. By hooking up to a Web-based protection network, each client becomes a part of a real-time global protection schema. When the network detects an Internet security threat on behalf of any one participant in the network, all participants are automatically and immediately protected. They act as “sensors” looking out for the rest of the subscribers. This protection also extends to all devices connected to the network. By affording this protection proactively, the network significantly lessens the need to download new pattern files, reload databases, or even perform that customary system scan. In this case, file size and memory consumption are no longer an issue. Needless to say, time to protect is shorter, and we may at last have the chance to beat malware writers at their own game.
Complete article can be found HERE
Since Computerworld link is broken now, I am posting the whole article above.
The Computerworld Philippines November 2008 Cover
My personal thanks goes to Macky and Jercyl of TrendLabs Tech Marketing team for their help on the “prettification” of the article and to Deb of MediaG8way for the CWP Logo and the permission to post here in my blog.
Hi Friends!!! I added mybloglog widget to my site. If you’re mybloglog enabled, kindly add my site. Thanks!!!
To those new in the blogging scene (like me), let me tell more insights on this mybloglog stuff. This widget is the one on the rightmost sidebar. Its title is Recent visitors and you need to log in your MyBloglog account (a yahoo website service) so that when you visit my site, you will be automatically logged and your name will be displayed in the site.
Its been less than a month since this site was initially setup and now I need to upgrade to WordPress 2.7???
Honestly that was my initial reaction. But upon reading wordpress.org posts on the 2.7 upgrade instructions, visiting top blog posts on the topic and knowing the importance of patching systems in a timely manner, I decided to give it a try.
The learning process was fun!!! Creating a backup for your WordPress files and DB, testing the backup, using tools provided in cpanel, following instructions, finalizing setup, checking that your site is really running 2.7 already, reactivating plugins, and finally doing the first post using 2.7… officially.
The admin console look and feel is refreshing 🙂 I will try the new features in the coming days. Thanks WordPress!
As I mentioned in the About page, I will try to post some food/resto reviews so here it goes.
I accompanied Maui in her window shopping spree last weekend :-). Before we do the actual “gruelling” task of shopping, I need to make sure I have enough energy. That means FOOD. We want to have Razon’s Halu-halo since its one of our favorite in Robinson’s Galleria foodcourt, but decided that we will have it later after the shopping. We decided to try Old Spaghetti House (I’ve never been inside this restaurant although I remember they have one branch in Libis). I ordered Gambasetti, she ordered the pasta meal with a long filename. It was Golden Crusted Chicken Ham and Cheese with Angel Hair Pomodoro (told you it was long). I liked the Gambasetti 🙂 As the name implies its a mix of Gambas (shrimps) and spaghetti. It’s a little bit spicy for me but combined with the pasta meal, we really enjoyed our treat :-). The price is also OK, not to pricey for a pasta resto. We’ll definitely try other dishes there some other time.
The NO votes overwhelmed the YES votes in the Quezon plebiscite last Saturday. Inquirer.net report states that around 70% percent of the votes casts are NO’s, while only 30% are in favor of split-up of the province into Quezon Del Norte and Quezon Del Sur. The report also said that that only a third of all registered voters in the province joined the electoral process. The leaders of NO proponents have called on their supporters to respect the results of the plebiscite.
Its really a long day for me today. The people have spoken and I will respect the decision made via this democratic process.
Today is the day to cast the YES or NO vote to the Quezon Del Sur and Quezon Del Norte initiative. I heard radio reports that the precints in the province opened at 7am. It is speculated that there will be a low turnout of voters this time because of the lack of information campaign related this plebiscite. It is also expected that the results will be known later today (or early Sunday), although because of the TRO issued by the SC, these results will not be proclaimed by Comelec . The Philippine National Police in the province is placed on heightened alert as a proactive move to prevent possible violence related to the plebiscite.
I will update this blog as soon as I significant updates on this topic. Previous post related this topic here.
Trend Micro reported that there is new malware called JS_DLOAD.MD found in the wild that exploits a vulnerability of Internet Explorer 7(IE7) browser. The report mentioned that the malicious file was uploaded to several websites (albeit unknowingly) and if downloaded by users will then download several other malware including some Trojan Spyware that steals account information for popular online games (Lineage and Legend of Mir) and a rootkit. More information can be found on their malware blog.
Last week I posted some info on malicious Firefox in this blog also and this week its IE7’s turn 🙂 Let’s hope that MS patch this bug soon. Maybe next week it will be Apple/Mac’s turn 🙂
I browsed Tonyocruz.com post and found out that the anti-ChaCha rally is today, December 12. Sorry I can’t make it but I am posting the invitation from the organizers (courtesy of Tonyo) as a show of support to the anti-ChaCha movement:
Dear Friends and Concerned Citizens,
Greetings of peace in these turbulent and uncertain times!
Recent moves in the House of Representatives by no less than Speaker Prospero Nograles and other administration allies to railroad their discredited bid to change the Philippine Charter (Chacha) by convening Congress into a Constituent Assembly (Con?Ass) has raised the alarm among many concerned sectors of our society.
Like in previous failed attempts at Chacha, a vast majority and still growing number of our people, are convinced that their real purpose is to extend the stay of Mrs. Arroyo in power well beyond 2010.
We thus call on you to be one with our people in declaring, “Enough! Stop Gloria’s Chacha now!”
Join us in an inter?faith, multisectoral prayer and protest rally on Friday, 12 December 2008, 4:00 pm.
Let us congregate at the Ninoy Aquino Monument, Ayala corner Paseo de Roxas, Makati City.
We also enjoin our kababayan in other cities and provinces to express their rejection of Chacha in various forms of protest nationwide.
Let us take a united stand once more so that truth, justice and the will of the people may prevail!
MOST REV. DEOGRACIAS S. INIGUEZ, JR., D.D.
Diocese of Caloocan