Archive for the 'always0nline' Category

shrink them down to size

Taiwan has developed tiny microchips that could lead to lighter and cheaper laptops or mobile phones, researchers and observers said on Wednesday.

State-backed National Nano Device Laboratories in northern Hsinchu city said it had succeeded in packing more transistors into smaller chip space than anyone else so far.

“Electronic gadgets like cellphones and laptops could become smaller, lighter and cheaper with this technology,” Yang Fu-liang, the lab’s chief, told AFP.

Currently, laptops seldom weigh less than about 1.5kg but the latest development could see notebook computers weighing as little as a 500 grams.

“It’s indeed the most advanced chip technology ever,” said Nobunaga Chai, an analyst at Digitimes, a Taipei-based industry publication.

Sounds promising. Right now netbooks are all the rage, weighing around 1kg and yet allowing users to surf the web and run basic applications. Imagine full functionality laptops next time that weigh 1kg, yet allow the user to play games, etc. Though that might put netbooks out of business…

facebook seppuku

If Facebook is taking over your life, a new website is offering you a way out.

The site, Seppukoo.com, offers ritual suicide for Facebook users’ virtual profiles by deactivating your account. And it doesn’t stop there. If you’re willing to end it all, the site will feature a RIP memorial page on its site and sends the page to all your Facebook friends.

“You are more than your virtual identity,” the site says. “Pass away and leave your ID behind.”

The site is named after the ancient Japanese samurai act of “seppuku.” The samurai preferred to die with honor. So, rather than fall into the hands of their enemies, samurai would voluntarily kill themselves by plunging a sword into their stomach.

“As the seppuku restores the samurai’s honour as a warrior, Seppukoo.com deals with the liberation of the digital body,” the site says.

The design and layout of Seppukoo.com is strikingly similar to Facebook – the exception being that Seppukoo is red and gray, while Facebook is blue and white. Another small point of differentiation: Seppukoo features paintings of sword-wielding samurai.

To take the final step, you simply type in the same information you use to log onto your Facebook account including e-mail address and password. (The site says it does not save the information.) Then choose one of six templates for the memorial page and compose your “last words.” After that’s entered: curtains. The profile is deactivated. (If you want back on Facebook, just log in and your account is reactivated.)

However, friends can write on your memorial page. In addition, you get points for recruiting others to commit “seppukoo” and follow you into the virtual netherworld. The site keeps score and lists the point leaders.

The site was produced by an Italian “imaginary art group,” called Les Liens Invisibles (translated from French: The Invisible Links). When asked for an interview, Guy McMusker, art director of the group, replied in an e-mail that Les Liens Invisibles couldn’t do it on the phone. The group couldn’t speak, he said, “because of its invisible nature.”

Members of Les Liens Invisibles, Clemente Pestelli and Gionatan Quintini, also created a Google maps parody and a Flikr parody. This is their latest spoof.

About 20,000 people have signed up on the site since it launched last month, McMusker said. Facebook says it has 300 million users.

But he insists that Seppukoo.com was not started to attack Facebook. Instead, the site aims “to help people discover what happens after their virtual life and to rediscover the importance of being anyone, instead of pretending to be someone.”

In fact, Les Liens Invisibles has a Facebook page.

“We’re not Luddites,” McMusker said. “We’re incoherent.”

Spending too much time on Facebook? Let this site commit seppuku for your Facebook account! You might just regain your life back. Your real life, I mean. Seriously speaking, how many of us spend hours on Facebook every day? Can you imagine how many other things you could have done with those “lost” hours? If you’re one of those who want to recover your life, maybe it’s time you visited Seppukoo.com today and say goodbye to Facebook once and for all.

Don’t worry, they only deactivate your profile. Just log in to Facebook again to come back from the dead…

joke’s on you, zucker

Facebook controversially forced profile pictures into public and pushed users to share candids with the whole world. So now we’re blessed with pics of the social network’s young CEO shirtless, romantic, clutching a teddy bear, and looking plastered.

So at least this whole privacy scandal hasn’t been for naught.

As a result of it, Mark Zuckerberg has gone from sharing very little of his personal Facebook content with the public to sharing a whole lot, True/Slant’s Kashmir Hill has noticed. Where the public could see just one photo of the Facebook co-founder in October, strangers now have access to a cache of 290 shots, including snaps uploaded by Zuckerberg and those uploaded by people who have tagged him in their pics.

This opening may be a result of Facebook’s new default settings; or could be a result of Zuckerberg trying to reverse the PR debacle of the new privacy system by opening up the content himself; or could be a combination of both. In any case, it springs one way or another from the privacy controversy. And as dogged but often frustrated chroniclers of Zuckerberg’s personal side, we’re thrilled. We just knew this new system would be a boon to gossips like ourselves.

This is pretty funny. Who knew that Facebook’s privacy changes would backfire on the CEO itself. Enough said, wanna see those pictures of the Zucker? Check them out here: http://bit.ly/6tNvYA

keep facebook safe

A large pop-up box will greet Facebook users logging on to the social-networking site on Thursday, asking them to modify their privacy settings.

The company says the changes will help streamline privacy controls that have confused many of its 350 million users and were sprawled over six separate pages.

What is getting the thumbs-down

Complaints have started flowing in, focusing on three areas:

The changes treat as “publicly available information” the following: your name, profile picture, current city, gender and networks, and the pages you’re a fan of.

Until now, you had the option of restricting much of that information. That option has been removed.

The ramifications, as the nonprofit Electronic Frontier Foundation sees them:

“For example, you might want to join the fan page of a controversial issue (like a page that supports or condemns the legalization of gay marriage), and let all your personal friends see this on your profile, but hide it from your officemates, relatives or the public at large.” You cannot do so now.

The foundation says: “These changes are especially worrisome because even something as seemingly innocuous as your list of friends can reveal a great deal about you. In September, for example, an MIT study nicknamed ‘Gaydar’ demonstrated that researchers could accurately predict a Facebook user’s sexual orientation simply by examining the user’s friends list.”

Facebook counters that a user’s friends list can be made nonviewable. But it is either viewable by all or by no one.

Another source of consternation is Facebook apps, such as the quizzes developed by third parties that many users are fond of taking.

Until now, Facebook provided an option so you could specify that your information not be shared with others when one of your friends adds such an app.

But now, whenever a friend adds an app, your “publicly available information” becomes accessible to the developer.

So why did Facebook undertake the changes?

The Weblog TechCrunch explains it this way: If a user retains the “Everyone” option, the information is accessible by the Web at large.

“In short, this is Facebook’s answer to Twitter. … That means Facebook can leverage it for real-time search, and can also syndicate it to other places, like Google and Bing. The feature has been available in the site’s privacy settings since last summer, but most people didn’t use it (and probably didn’t even know it was there). The new privacy launch today puts this as the default option for many users.”

The changes have met with mixed reaction. By early Thursday, more than 2,700 users had approved of the changes on the Facebook blog.

But about 700 people said they were unhappy.

“The new setting[s] are ridiculous,” commented user Victoria Anne Archer. “I have less control than before and my friends are visible to everyone … I can’t hide them … but I have no choice … because if I select only friends … then NO ON[E] CAN FIND ME!”

What is getting the thumbs-up

The most commended aspect of the new settings is that they allow users to micromanage who can access every bit of information on the site.

One way to do so is to separate your friends into lists and grant those lists varying levels of accessibility.

For example, if you would rather your bosses not know what you do on downtime, you can place them on a specially created list.

In addition, a user can specify accessibility post by post.

After each status update you type or photo you post, you can pick from a drop-down menu whether you want that item visible to everyone, to just your friends, or to friends of friends as well.

How to access the changes

The new controls will be available under the “Settings” link at the top right of every page, in addition to being available in the dialogue box.

For each section — profile information, contact information, applications and search — users will be asked to pick from three options about who can access the information: Friends, Friends of friends, or Everyone.

The changes do away with “regional networks,” which let users designate themselves as residents of a geographic area. But Facebook is retaining school- and company-based networks.

It is worth noting that many users will find their privacy options set at “Recommended settings” by default. If you retain those, your information will be available to everyone.

If you would rather the site not share your information publicly, you will need to click through each section and restrict it to “Friends” only.

This applies for photos as well. A user will have to specify album by album how much access to grant others.

In addition, you will have to go under “Search” and specify whether you want Facebook to make your information available to users who look for you on Facebook and on the Web.

Increased privacy control for Facebook? Sounds like a good idea, considering that almost everyone has a Facebook account right now. I’m sure people want a way of ensuring that their personal information isn’t shared unknowingly with people that they don’t know. Still, it’s a bit troublesome, and for some people they might just decide to skip the whole configuration, which defeats the purpose of having these improved privacy measures in the first place.

scamming the search engines

Even search engines can get suckered by Internet scams.

With a little sleight of hand, con artists can dupe them into giving top billing to fraudulent Web sites that prey on consumers, making unwitting accomplices of companies such as Google, Yahoo and Microsoft.

Online charlatans typically try to lure people into giving away their personal or financial information by posing as legitimate companies in “phishing” e-mails or through messages in forums such as Twitter and Facebook. But a new study by security researcher Jim Stickley shows how search engines also can turn into funnels for shady schemes.

Stickley created a Web site purporting to belong to the Credit Union of Southern California, a real business that agreed to be part of the experiment. He then used his knowledge of how search engines rank Web sites to achieve something that shocked him: His phony site got a No. 2 ranking on Yahoo Inc.’s search engine and landed in the top slot on Microsoft Corp.’s Bing, ahead of even the credit union’s real site.

Google Inc., which handles two-thirds of U.S. search requests, didn’t fall into Stickley’s trap. His fake site never got higher than Google’s sixth page of results, too far back to be seen by most people. The company also places a warning alongside sites that its system suspects might be malicious.

But even Google acknowledges it isn’t foolproof.

Some recession-driven scams have been slipping into Google’s search results, although that number is “very, very few,” said Jason Morrison, a Google search quality engineer.

On one kind of fraudulent site, phony articles claim that participants can make thousands of dollars a month simply for posting links to certain Web sites. Often, the victims are asked to pay money for startup materials that never arrive, or bank account information is requested for payment purposes.

“As soon as we notice anything like it, we’ll adapt, but it’s kind of like a game of Whac-A-Mole,” he said. “We can’t remove every single scam from the Internet. It’s just impossible.”

In fact, Google said Tuesday it is suing a company for promising “work at home” programs through Web sites that look legitimate and pretend to be affiliated with Google.

Stickley’s site wasn’t malicious, but easily could have been. In the year and a half it was up, the 10,568 visitors were automatically redirected to the real credit union, and likely never knew they had passed through a fraudulent site.

“When you’re using search engines, you’ve got to be diligent,” said Stickley, co-founder of TraceSecurity Inc. “You can’t trust that just because it’s No. 2 or No. 1 that it really is. A phone book is actually probably a safer bet than a search engine.”

A Yahoo spokeswoman didn’t respond to requests for comment. Microsoft said in a statement that Stickley’s experiment showed that search results can be cluttered with junk, but the company insists Bing “is equipped to address” the problem. Stickley’s link no longer appears in Bing.

To fool people into thinking they were following the right link, Stickley established a domain (creditunionofsc.org) that sounded plausible. (The credit union’s real site is cusocal.org.) After that, Stickley’s site wasn’t designed with humans in mind; it was programmed to make the search engines believe they were scanning a legitimate site. Stickley said he pulled it off by having link after link inside the site to create the appearance of “depth,” even though those links only led to the same picture of the credit union’s front page.

The experiment convinced Credit Union of Southern California that it should protect itself by being more aggressive about buying domain names similar to its own. Domains generally cost a few hundred dollars to a few thousand dollars each — a pittance compared with a financial institution’s potential liability or loss of goodwill if its customers are ripped off by a fake site.

“The test was hugely successful,” said Ray Rounds, the credit union’s senior vice president of information services.

Stickley’s manipulation illuminates the dark side of so-called search engine optimization. It’s a legitimate tactic used by sites striving to boost their rankings — by designing them so search engines can capture information on them better.

But criminals can turn the tables to pump up fraudulent sites.

“You can do this on a very, very broad scale and have a ton of success,” Stickley said. “This shows there’s a major, major risk out there.”

Robert Hansen, a Web security expert who wasn’t involved in Stickley’s research, said ranking high in search engine results gets easier as the topic gets more obscure. An extremely well-trafficked site such as Bank of America’s would always outrank a phony one, he notes.

Still, Hansen said, criminals have been able to game Google’s system well enough to carve out profitable niches. He says one trick is to hack into trusted sites, such as those run by universities, and stuff them with links to scam sites, which makes search engines interpret the fraudulent sites as legitimate.

“I don’t think we’re anywhere near winning” the fight against such frauds, said Hansen, chief executive of the SecTheory consulting firm.

Roger Thompson, chief research officer for AVG Technologies, who also wasn’t involved in the research, said search results can be trusted, for the most part.

“But the rule is, if you’re looking for something topical or newsworthy, you should be very cautious about clicking the link,” he said. That’s because criminals load their scam sites with hot topics in the news, to trap victims before the search engines have a chance to pull their sites out of the rankings.

“The bad guys don’t have to get every search,” he said. “They just have to get a percentage.”

Consumers can protect themselves from scam sites by looking up the domain at http://www.whois.com, which details when a site was registered and by whom. That can be helpful if the Web address of a phony site is similar to the real one.

Looks like search engine optimization (SEO) can be put to fraudulent uses too, as shown by Stickley and his fake site. It’s scary to know that your favourite search engine Google or Yahoo is delivering scam sites to you when you search with them. Who’s going to take the blame when the user gets scammed? Surely the search engine will have to take some of the responsibility as well, for not ensuring that they do not index phishing sites in their databases. Of course, the bulk of the responsibility still lies on the user to ensure that they are on the correct website before entering sensitive information such as bank account information or usernames and passwords.

Some simple things to look out for:

  1. Check the address bar – is the URI familiar?
  2. Look out for the https protocol – this shows that you’re on a secure connection. While even this may be faked, there’s a higher probability that you’re on a genuine site if https is being used.
  3. Look out for SSL when doing online banking. There should be a lock icon in the bottom right corner of your internet browser. If you’re using Firefox, you can also look at the address bar, where they will identify the owner of the SSL certificate.

get paid to search for porn

The Chinese government has offered rewards of up to 10,000 yuan (£888) to internet users who report websites that feature pornography.

As part of its latest campaign to weed out internet content that “harms public morality”, the government announced the incentive scheme over the weekend.

However, the campaign appears to have encouraged internet users to search for pornography online.

Within 24 hours, a hotline at the Internet Illegal Information Reporting Centre was flooded with more than 500 phone calls and 13,000 online responses, according to Xinhua, the state news agency.

The censors are searching for any websites that contain obscene material or which advertise sexual products. The first person to report each site will receive between 1,000 yuan and 10,000 yuan after a committee had reviewed the tip-off.

The Chinese authorities have already been through several rounds blacking out online pornography. Earlier this year, Google was publicly sanctioned for not filtering out pornography from its search engine in China, and in the middle of November the government announced that it wanted to extend its censorship to any websites that can be accessed by mobile phones.

The government has, however, backed down from an earlier proposal to install censorship software, a programme called Green Dam, on every personal computer sold in the country.

Meanwhile, the China Business News newspaper reported that regulators in China have shut down hundreds of video-sharing websites in a bid to control content more closely. Several well-known websites were ordered to delete links to downloaded films or television series in the past week. One site, BTChina, said on its website that the State Administration of Video, Film and Television had commanded it to close because it had no license to provide audio or video content. The newspaper said 414 video-sharing websites had been shut so far this year. Facebook, YouTube and Twitter are also all banned.

Where else can you find such a good deal? Getting paid to surf porn on the internet. At 1000 yuan per pornography site, it’s pretty good money that could be earned in a couple of minutes, if you are good enough in searching. Of course, don’t expect it to replace your day-time job, since the number of pornography sites accessible will be decreasing steadily everyday as everyone reports them for the reward.

appulous troll bridge: 37

Looks like the Appulo.us troll bridge is back in business. Great news if you’re “in the scene”, since you probably know the answer to the troll bridge. But for the rest of us commonfolk, we need some help.

Without further ado, here’s the current question:

Question: Kyek modified a Greasemonkey plugin to allow you to see if an Appulous IPA link was dead before you clicked it. The original plugin was the ________ Links Checker.
Answer: Cavern

Smoother video-streaming

VIDEO-streaming from YouTube and access to other sites in the United States will be smoother – and less prone to disruption – for StarHub users when a new undersea cable system starts operations next month.

The US$500 million (S$696 million) Asia-America Gateway (AAG) will increase the Singapore telco’s overseas Internet bandwidth by 30 per cent and is designed to provide a capacity of up to 1.92 Terabits per second of bandwidth.

Built over three years by StarHub and a consortium of 18 other telcos, including America’s AT&T and Malaysia’s Telekom Malaysia, the cable system stretches 20,000km from the eastern part of Singapore to the Philippines, then directly across the Pacific Ocean to the US.

StarHub chief executive Terry Clontz said the cable system avoids the ‘volatile and hazardous Pacific Ring’ – which existing Internet submarine cables connecting Singapore to the world run through – which is prone to earthquakes and other natural disasters that could damage the cables.

Damage to submarine cables in that region in 2006, when a 7.1-magnitude earthquake struck off Taiwan, cut off Internet connectivity between Southeast Asia and the rest of the world. Online economic activity in the region ground to a nearhalt.

Traffic was re-routed through other cables, but it took almost two months to restore full capacity.

While StarHub has invested in other submarine cables, it will route most of its current network capacity to the AAG, said a spokesman.

As the AAG offers a more direct route to the US, through fewer routers – which are devices that forward data packets – access to US-based Internet websites, the main online destination, will be quicker.

Mr Clontz said that it was hard to measure the improvement precisely as factors like the number of users trying to access the websites also matter.

Industry analyst Adeel Najam said that the AAG’s increased bandwidth would not necessarily translate into a vast improvement in broadband speeds, adding: ‘The bottleneck in Internet traffic for users here mostly occurs within Singapore itself…not in cables linking Singapore to overseas.’

Minister of State for Trade and Industry and Manpower Lee Yi Shyan, at the official launch of the AAG at The Ritz-Carlton Millenia yesterday, stressed that Singapore’s connectivity must continually improve as IT and media technology evolve rapidly.

Another submarine Internet cable to the US, being built by SingTel, PacNet, Google and other telcos, is expected to be ready in the first quarter of next year.

Something to look forward to next year, when streaming speeds increase. Since most popular sites are based in the US, this submarine cable should increase internet speeds for most people when they surf websites. Too bad it’s for Starhub only – when are we gonna get upgrades too, M1 and Singtel?

google street view for singapore

A HIGHLY controversial virtual-tour service by Google arrived in Singapore yesterday. And, already, it has polarised Internet users here on whether it infringes privacy.

Street View was launched by the American search-engine giant in the United States in May 2007 and is now accessible for free in more than 100 cities in the world.

Users can embark on a virtual tour in and around the streets of Singapore, enjoying a 360-degree and panoramic 3-D view of roads, buildings and iconic landmarks.

The service is available via smartphones as well.

Singapore is the first country in South-east Asia to get the service. Japan is the only other Asian nation to have it.

While some users welcome Street View, others are not so enamoured of it.

Privacy advocates in countries such as Britain, Japan and the US had complained that images featuring private gardens as well as people sun-tanning, leaving strip clubs or falling off their bikes were captured and made available to all and sundry.

In response, Google started, in July last year, to blur faces and licence-plate numbers.

However, it has been criticised for some poorly-blurred images.

Just last month, Swiss privacy watchdog Federal Data Protection and Information announced that it would sue Google for failing to make human faces and car plates “sufficiently unrecognisable”.

Mr Andrew McGlinchey, Google’s head of product management in South-east Asia, said users who object to certain images can report them by clicking on “Report a Problem” in the bottom left-hand corner of each image on maps.google.com.sg

While concerns will be addressed within 24 to 48 hours, requests for removal will be handled on a case-by-case basis.

Mr McGlinchey said that its pictures are taken from public areas, and hence “we prefer not to (remove them)”.

Also, he added that “99.9 per cent of users love” the service. Still, if the images feature private homes, they will honour requests to take them down because of privacy issues, he said.

Marketing executive Sylvia Ng, 24, likes the tool as it helps her plan her itinerary.

“A map is 2-D, so sometimes you can’t gauge the actual distance of the next turn. This can provide landmarks. Also, now I can find the entrance to obscure carparks,” said the motorist.

She has no issue with having her image taken if it was recorded in a public setting, she added.

However, for project engineer Timothy Lim, the idea of having his image splashed online for all to see is “a little unsettling”.

“It feels like Big Brother in the book 1984, where people are watching your every move. I wouldn’t want to be caught doing something embarrassing,” he said.

Google said that images of Singapore streets, which range “in the millions”, were taken between October last year and the beginning of this year.

Cameras perched on top of cars took high-resolution pictures every few metres.

Mr McGlinchey said that the service will be updated “sometime next year” when major construction projects such as the integrated resorts and shopping malls in Orchard Road are completed.

From October, it had also begun using tricycles to record images of small nooks and pedestrian paths which cannot be accessed by cars.

The information gathered will be made available only next year.

Mr Ken Low, assistant chief executive for marketing at Singapore Tourism Board (STB), is a fan of Street View.

He said: “It will raise Singapore’s prominence and reach through the Internet. People unfamiliar with Singapore can now get a first look at our city.”

Just 2 days ago I took Google Street View out for a test drive. It’s pretty awesome finally being able to see familiar places on Street View – Up till a few days ago, Google Street View wasn’t available in Singapore. Most of the major roads are covered so far, bu the images look like they were taken months ago. It’s great to know that they’ll be updating the images next year once the integrated resorts and shopping malls are finished. Else, foreign visitors wouldn’t be able to see these buildings on Street View.

On a side note, now we can build an exercise bike and hook it up to Google Street View too! Just like what this guy did: http://hackaday.com/2009/11/11/biking-through-google-street-view/

don’t hack my password

Enterprises looking to maintain IT infrastructure integrity and deter hackers from attacking employees’ passwords, can tap software and simple guidelines to generate secure passwords, according to a security specialist.

Ronnie Ng, Symantec’s manager of systems engineering in Singapore and Indonesia, noted that there are systems and configuration management software, which include components and policies that allow IT administrators to enforce strong password guidelines within the organization.

Recent security incidents have stepped up the need for robust secret code. Last month, 20,000 passwords obtained from a phishing scam turned up on a third-party Web site, revealing login credentials to Windows Live Hotmail, Gmail and Yahoo Mail accounts, among others. A subsequent analysis of the compromised passwords revealed that many users were tardy in creating secure passwords.

Viruses such as Conficker and Gumblar, have already attacked the IT infrastructure of organizations such as the Australia and New Zealand Banking Group.

With these in mind, here are five considerations to strengthen passwords and the password-generating process, for both work and play.

  • Use tools that automatically generate random passwords

IT professionals, Symantec’s Ng noted, should make use of business software that allow the automatic generation of random passwords based on a fixed schedule.

“So even if a certain password somehow becomes compromised, it will only be good until the randomization expires, and it will only apply to [a] particular computer,” said Ng.

  • Use alphanumeric characters and unique symbols to create stronger passwords

Alphanumeric characters with a mixture of upper and lower case letters, numbers and symbols, will make it tough for hackers to crack. Employing this approach will make passwords “as meaningless and random as possible”, according to Ng.

Tech author and columnist J.D. Biersdorfer, noted in a video for the New York Times that such characters and symbols should also be worked into the answers of your challenge questions.

  • Instead of mnemonics, try a ‘pass-phrase’

Researchers at the Carnegie Mellon University in the United States have found out that using mnemonics, which require users to generate a password using the first letter of every word in a sentence, are not as secure as initially thought.

According to a Newsweek article, 144 volunteers were each asked to create a mnemonic password in a study conducted in 2006. The researchers then built a simple program to scour the Web for famous quotes, ad slogans, song lyrics and nursery rhymes, amassing 249,000 entries. Using this list, which is a relatively small universe of phrases in the security field, the researchers cracked 4 percent of the group’s mnemonic passwords, proving that this method has its fallibility.

Far more secure are pass-phrases such as “du-bi-du-bi-dub”, which would withstand a brute force attack–in which a hacker attempts “a,” then “ab”, then “abc”, and so on–for “531,855,448,467 years”, according to the report. So think long, but easy to remember phrases, the next time you generate a password.

  • Change passwords periodically

According to Symantec’s Ng, organizations should incorporate system prompts to alert employees to change their password every 45 to 60 days. Frequent password changes result in higher security, making it more difficult for intruders to access company data using outdated passwords. “But do strike a balance as overly frequent changes may hinder productivity,” he noted.

  • Avoid generating passwords using personal information

Internet users have a common headache: there are too many passwords to remember. Today, with Web-based email programs, Internet banking accounts, instant messaging tools, and corporate office computers among some of the more common systems or equipment requiring a password to authenticate entry, it is hard work for users to remember all their passwords.

However, users should not base passwords on the convenience of their personal information, Ng pointed out. Such data include names, nicknames and birth dates.

Former Governor of Alaska in the U.S., Sarah Palin, is a cautionary tale. Last year, her personal e-mail account was hacked into by a student, who simply searched the Web to find out Palin’s birth date, postal code and where she had met her husband to crack her security code.

So who wants to try a password like “du-bi-du-bi-dub”? That’s quite an interesting one, and it looks easy to remember as well. Another issue that wasn’t covered in this article is the fact that people like to use ONE password for everything: their email account, Paypal, eBay, etc. It’s pretty simple to get to the rest of the accounts once you know one of the passwords. Get into an email account like Hotmail and by sifting through their inbox, it shouldn’t be too hard to guess what other sites they visit on a regular basis.


always0nline’s archives

always0nline's statistics

  • 4,949 views