Monday, March 14, 2011

SRIKANDI PERTIWI

Srikandi Pertiwi,

Dari Dasar Lautan Dalam

Telah Diangkat Ke Permukaan

Menyemarakkan Lautan Biru

Menyinari Ceruk Dan Pantai

Merubah Lautan Menjadi Daratan

Dengan Warna-Warna Keindahan

Menggilap Yang Kelam

Mencerna Yang Suram

Begitulah Srikandi Pertiwi Ini

Telah Menyinari Pasukan PDRM

Telah Mencaknakan JSJK Bukit Aman

Dari Kecemerlangan Minda Yang Ada

Buat Merealisasikan Hasrat Pasukan

Di Jiwa Masyarakat Sejagat

Kepimpinan Yang Bistari

Kepimpinan Yang Penuh Pengorbanan

Terlalu Istimewa Buat Kita Semua

Usaha Yang Dipertingkatkan

Dititip Kepada Warga Pengaman

Kemantapan Dalam Kerjaya

Ditatang Menjadi Lagenda

Komitmen Yang Ada

Dikendong bagai kaca

Srikandi Pertiwi

Di Kala Persaraanmu

Usah Dikau Lupa Kenangan Dan Memori

Kerana Kami Tidak Bisa Melupakanmu

Walau Sejenak Hingga Pengakhiran

Dalam Ribuan Doa Dan Harap

Selagi Nadi Masih Berdenyut

Kami Ucapkan Terima Kasih

Buatmu, Srikandi Pertiwi

Tuesday, January 4, 2011

Privacy Alert: Biggest Threats of 2010

1. Google's Wi-Fi Spying

Threat Level: GREEN

Google's Wi-Fi spying debacle didn't start out evil. By using its Street View vans to map out open Wi-Fi networks, Google could provide better location data to mobile users. If you use Google Maps from your phone, it could employ nearby wireless networks to determine where you are, no GPS required.

Google Street View carHas this car been spying on your Wi-Fi network?The problem: Besides the Wi-Fi network's name and location,Google's Street View vans were accidentally slurping up unencrypted data--including user passwords and e-mail messages. Over three years, Google gathered 600GB of extra data in more than 30 countries, resulting in international sanctions, civil lawsuits, and an FCC probe.

Even so, the impact on average consumers is minimal, says Peter Eckersley, senior staff technologist for the Electronic Frontier Foundation. You're in greater danger of being spied on by nosy neighbors or creeps parked outside your house.

The solution: Password-protect your wireless network (duh) and use encrypted HTTPS connections to browse the Web when possible (see item #3 below).


2. The iPad E-Mail Leak

Threat Level: GREEN

iPad 3GIf you bought one of the first iPad 3G units to leave the stores, your e-mail address may have been compromised.If you bought one of the first Apple 3G iPads, an obscure security group may have purloined your e-mail address.

Last June, Goatse Security exploited a hole in AT&T's Website that displayed an iPad owner's e-mail address when it encountered an HTTP request containing that user's ID number. Goatse flooded AT&T.com with URLs containing random 20-digit numbers and collected 114,000 e-mail addresses of iPad owners. It then shared a few of them with Gawker.

The good news? The Goatse hack didn't reveal passwords, so the group couldn't access information beyond your name. And you're in select company--ABC's Diane Sawyer, New York Mayor Michael Bloomberg, and top government and military officials also had their addresses stolen.

The solution: None needed. AT&T quickly closed the hole--and if a spammer wants your e-mail address, there are easier ways to get it. So is the iPad magical and life-changing yet?


3. Facebook Wi-Fi-Jacking

Threat Level: YELLOW

Updating your Facebook status from a Wi-Fi café? A stranger can log in to your account and pretend to be you. Blame Firesheep, a free Firefox plug-in that captures login cookies as they fly by unencrypted. Programmer Eric Butler wrote the program to demonstrate how much data people send "in the clear" without realizing it. Using Firesheep, a hijacker can access your account on Facebook, Twitter, and two dozen other sites. Any information you thought was private now isn't. Feeling naked yet?

The failure of sites such as Facebook and Twitter to require secure logins is "an enormous privacy problem," says the EFF's Eckersley. "Google demonstrated this could be done on a colossal scale at minimal cost with Gmail. Now we need to get the rest of them to do that."

The solution: Use EFF and the Tor Project's HTTPS Everywhere plug-in for Firefox to force sites to use SSL encryption if available. And don't log in to sites containing sensitive info from a public network.


4. 'Naked' Security Scans

Threat Level: BLUE

TSA Boddy ScanTSA body scans may sound a little personal, but c'mon: How personal does this really look?If Firesheep doesn't make you feel naked, passing through airport security might. Major U.S. airports and federal buildings are deploying body scanners that can peer through clothing, rendering you virtually nude to security guards viewing the scan.

It gets worse. Last August, the U.S. Marshals Service in Orlando, Florida, admitted to storing some 35,000 body scans it was supposed to have destroyed. Naturally, some of those found their way onto the Net.

The Electronic Privacy Information Center filed suit against the Department of Homeland Security, attempting to keep airports from deploying the machines. A wave of protest ensued, including everybody from ordinary people to members of the Allied Pilots and U.S. Travel Associations.

The solution: In lieu of a scan, you can opt for an "If you touch me there, you'd better buy me dinner and a movie first" full-body frisk. But we don't think you'll feel any less violated.


5. Mobile Malware

Threat Level: YELLOW

The smartphone in your pocket is catnip to malware authors, yet mobile security is barely on most people's radar, says Winn Schwartau, chairman of security vendor Mobile Active Defense.

Kaspersky Lab identified the first malware known to target Android phones last August, androgue code targeting jailbroken iPhones and iPads has been available for over a year. Schwartau agrees with estimates that 20 percent of all Android and iPhone apps may be infected.

"Mobile apps are the best hostile-code delivery system ever invented," Schwartau says. "The entire mobile space is in chaos."

The solution: Before you install a new app, do some sleuthing to suss out potential red flags; avoid apps from unfamiliar vendors or sites. "Install Gotcha 1.0 from Bob's App Store?" says Schwartau. "I don't think so."

Source : http://www.pcworld.com