Personal computing was defined to allow you to do whatever you want in your computer, in your own way. Whatever you create is yours. You may choose to save it, process it or share it and it will still legally belong to you.
If you are writing a letter, you may choose any word processing applications of your choice on any computer to work on it, save it across multiple formats & share it. The software should not hold you back on formats nor it should force you to store your documents anywhere you don’t expect it to, with or without your knowledge.
Many of us now have multiple computers, notebooks and to some extent, personal servers. Business & convenience demands have increased forcing us into real time, mobile and cloud computing. We are free to work in open areas with or without wireless access or power supply to get our jobs done.
In most cases, our demand for mobility grew exponentially, however, the supply of wireless access and power has limit us from performing our tasks properly. Wireless internet access has not caught up quickly as what we wanted to as well as battery technology.
This had led us to cloud computing. In some words, its an idea to allow us to access our data which we choose to store on that server and or to process them, and to access them when we needed it. Its a great approach, it solves our fundamental problem of mobile computing. I don’t have to bring copies of my vacation pictures everywhere in several discs just to show them once a while, I just needed to rely on a web service in a cloud server that stores, processes & displays them whenever I feel like showing it.
A great idea leads to a great business opportunity. From online directories, blogs, and online social websites sprung in matter of years to take advantage this. Its not a force not to be reckon with, not its just a fad that will go away. Its actually a working business model that works & makes money. The problem is its profiting on your expense.
The business model of cloud computing relies on information, your information. The more you give, the more bigger they get, the bigger they get, the more money they make and to some cases, the more they don’t care.
Privacy has always been a huge concern, from personal computing up to cloud computing. However, we are always exposed to privacy threats with and without our knowledge. The ones we know is a quick scam to rip information from us in a benign fashion. While we could differentiate this, its almost impossible to even detect hidden privacy threats that are directly in our control.
Business in the privacy area has started since the late 80’s with antivirus and firewalls. But this only works if you kept updating them as the threats never tend to stop. Even an experience user would caught with a virus or spyware. Now, remember, this is all threats to a machine that you have direct control of.
Supposing you use and rely on a service such as an online service that stores all your pictures. Its perhaps free & you are happy with the service. What are the chances will the server being infected with viruses, spy wares & threats? Spy ware and viruses, maybe little, but security threats happen all the time. For most servers out there, brute force login attacks happen almost every second, and in every program evolution, they might be successful. Sometimes, some online services may crash, bringing down all your data along with it, but your liability is normally a few hours of latest data just like when your computer shuts down in a middle of editing a document.
So, what do we have to loose? Its its a free service and if it fails, we find another service don’t we? Thats not even the question we have to start with. What we need to ask is what if someone steals our data, what would they do with it?
In the late 90’s and early 2000, online credit card fraud was so common that extensive campaigns were launched to re educate users that online transaction is safe and that the chances of your card being stolen in petrol pumps are higher. But what they don’t tell you is that the scope of data they compare is irrelevant and most cases are not reported, even if they were reported, they were not taken into the statistics due to credibility reasons. At one point of time, small amount frauds are not even considered a problem!
Heres a real example of a credit card fraud life cycle. Most credit card numbers are normally hacked from servers they claimed, Not true. Most servers don’t have any security to begin with, its like Fort Knox with an open door. Its impossible for anyone not to notice this.
However, most servers that don’t update their systems have reported weaknesses that people exploit. But in most cases, they just use any search engine like AltaVista or Yahoo to do their job. Most searches of /etc/passwd would actually reveal the real password file in the server. All someone has to do is to do is the crack the password file & log in. Another popular search is creditcard.txt or creditcard.dat.
What they do with your stolen card number is simple, they fake a purchase or subscription to they product or services, essentially making what they earn legal from a business stand point. Shell services is a popular package. It allows one to have a unix account that does code compiling, testing or even having irc bots on your behalf. Its normally USD 5-9.99 a month. They would normally fake a subscription for a 24 month subscription and charge the card. Because you did not notice or report your card was stolen, its probably going to take some time before you file a report and hence starting a string of disputes.
To avoid this trouble, most banks and gateway services would normally ignore small frauds. Most of them would be forgotten or refunded. And since the liability is so small, its soon a non issue for most people.
Remember, your lost is directly related to your liability. If you are refunded because of a credit card fraud, its not your problem or your liability as you would be refunded. However, if you were to loose any precious data, its your problem if its worth to others.
Back to Cloud Computing. While it helps you solve your intimidate problems, it posses a larger threat to you without you noticing it. This time, your data’s liability is limited to you and no cloud service would compensate for your lost of data, only the down time. So, if your private Banking documents or passwords are stolen because of their carelessness and malpractices, it would be your fault for relying on them. If you don’t have a backup, you are toast. Remember, most services would not report a break in unless its made public. So, in most cases, you wont have any knowledge about it.
What about privacy? The more money a free service makes is directly related to the number of they expose, not what they keep. Meaning to say, If they keep all your pictures for yourself to view, how would they make money? They make money normally from advertisement & since you have a small tendency to view your pictures once a year, many of your friends would view it more often & every page view would translate to an opportunity to sell advertisements and in a rate of 3% ( 3 clicks per 100 views ), the more page views that expose, the more money they possibly make. So they encourage you to share, making it easier, even to access your contact list in your mail account & mail everyone along it.
Is sharing caring to the free services? No. its purely a numbers game for profit.
Most of your data thats online probably belongs to them & they every right to do whatever they want to. It does not mean that they didn't do anything today means they wont in the future. When business become desperate, so will the measures. Do you really think anything you delete would be removed from their server immediately? How would you know? For once, you have totally no control.
Heres the same Cloud Computing Services that we trust so much being a time bomb in the near future.
Saturday, July 17, 2010
Saturday, February 20, 2010
Solution: How to get your Browser to Post the Value of an UnChecked CheckBox
Heres a simple & easy way to get your Browser to Post the Value of an UnChecked CheckBox.
Please note that HTTP protocols does not mandate any browser to send values of any Form Input Elements when its not Selected/Checked.
Hence, A CheckBox that is not Checked will not be posted by the browser.
SOLUTION:
The technique is simple, Simply create another CheckBox with a different ID but with the same name as the original CheckBox but set the Style as Display: none and its Checked Status as ON and Value as empty.
When a User clicks on the CheckBox, have the logic to set the Value to the original CheckBox to 1 and the Hidden CheckBox to the value of Empty String.
When its unchecked, set the value of the second hidden CheckBox to the UnChecked value while remaining hidden eg Value to 0.
Lets call the Original CheckBox as Name:active, Id:none
Lets call the Hidden CheckBox as Name:active, Id:active_1
SAMPLE:
<form name="formx" id="formx" method="POST" action="foobar.jsp">
<input name="active" value="1" checked="checked" onclick=" if (document.formx.active.checked==true) { document.formx.active.value='1'; } else { document.getElementById('active_1').value = '0'; document.getElementById('active_1').checked = true; }" type="checkbox">
<input id="active_1" name="active" value="" style="display: none;" type="checkbox">
<input name="save" value="Save" type="submit">
</form>
---------------------------
Hope this helps
G
Please note that HTTP protocols does not mandate any browser to send values of any Form Input Elements when its not Selected/Checked.
Hence, A CheckBox that is not Checked will not be posted by the browser.
SOLUTION:
The technique is simple, Simply create another CheckBox with a different ID but with the same name as the original CheckBox but set the Style as Display: none and its Checked Status as ON and Value as empty.
When a User clicks on the CheckBox, have the logic to set the Value to the original CheckBox to 1 and the Hidden CheckBox to the value of Empty String.
When its unchecked, set the value of the second hidden CheckBox to the UnChecked value while remaining hidden eg Value to 0.
Lets call the Original CheckBox as Name:active, Id:none
Lets call the Hidden CheckBox as Name:active, Id:active_1
SAMPLE:
<form name="formx" id="formx" method="POST" action="foobar.jsp">
<input name="active" value="1" checked="checked" onclick=" if (document.formx.active.checked==true) { document.formx.active.value='1'; } else { document.getElementById('active_1').value = '0'; document.getElementById('active_1').checked = true; }" type="checkbox">
<input id="active_1" name="active" value="" style="display: none;" type="checkbox">
<input name="save" value="Save" type="submit">
</form>
---------------------------
Hope this helps
G
Tuesday, February 17, 2009
Thursday, February 12, 2009
Android G1 Google Voice Search
I have been trying on G1 for a while & recently, I got an update for G1.
Among the new features are Google Voice Search.
However, I could not get to search accurately.
Almost All my searches are misspelled.
For eg. "Java" ended up to be "Joel" or "Gala" or "Jeld-Wen".
Perhaps Im not saying it well, any ideas?
Here are some pictures (Sorry, I got the pics from Photo Booth, its horizontally Inversed)
Sunday, November 23, 2008
Personal Note
I hope many of us believe in god, whatever you call him or any form you want him to be. the truth is, god is the highest power among anything. This saying, if you are in deep problems or maybe you want to say, you pray and wish for gods blessing to help you with your problems. However it may seem, we rely on god.
I hope many of us believe that we are created equal on the eyes of god & we are connected to god in the most deepest & personal level, all you need to do is believe & talk him from your heart & I bet he will listen.
I hope that the hopes above are true, we are eventually doing the same thing, however you may call it.
Since these are true, what are we to god?
Are we children? Slaves? Friends? The fact is that we are SIGNIFICANT to god. The fact is that our mother & father created us. The fact is that god wanted us to be here.
Question 1: Was there any man that stood in god's way to allow you into this world?
Question 2: Are you a child/slave/friend (/=and OR) of god?
Question 3: When you die, do you answer to god or to another man?
If you favor god to another man, I respect you, If you dont, please don't read further.
Why is it that many of us rely on others for gods wisdom?
Why do we need to rely on others when god is hearing us?
Why do we need to follow what others say when god is on your side & what you believe in god is true?
God gave us the ability to think & rationalize, Why are we not using it, Why do we need to follow another man. This man is not god.
Sticks and stones will break your bones, with a sense of deepest calamity & benign love you can say you believed in him(god) even in the darkest times when you meet god.
I hope many of us believe that we are created equal on the eyes of god & we are connected to god in the most deepest & personal level, all you need to do is believe & talk him from your heart & I bet he will listen.
I hope that the hopes above are true, we are eventually doing the same thing, however you may call it.
Since these are true, what are we to god?
Are we children? Slaves? Friends? The fact is that we are SIGNIFICANT to god. The fact is that our mother & father created us. The fact is that god wanted us to be here.
Question 1: Was there any man that stood in god's way to allow you into this world?
Question 2: Are you a child/slave/friend (/=and OR) of god?
Question 3: When you die, do you answer to god or to another man?
If you favor god to another man, I respect you, If you dont, please don't read further.
Why is it that many of us rely on others for gods wisdom?
Why do we need to rely on others when god is hearing us?
Why do we need to follow what others say when god is on your side & what you believe in god is true?
God gave us the ability to think & rationalize, Why are we not using it, Why do we need to follow another man. This man is not god.
Sticks and stones will break your bones, with a sense of deepest calamity & benign love you can say you believed in him(god) even in the darkest times when you meet god.
Thursday, November 20, 2008
Adding a new IP Address in Mac OSX
Theres a simple way to add a new IP address. In my case, I need to handle multiple virtual hosting & lots of load balancing.
Heres a neat way:
ifconfig [E] alias [NEW IP ADDRESS] netmask 255.255.255.255
eg.
ifconfig en0 alias 10.1.1.11 netmask 255.255.255.255
If you need to have a dedicated hostname to a IP address, then edit /etc/hosts
add a new line
[IP ADDRESS] [HOSTNAME]
Remember to press TAB to separate the IP address and the hostname.
eg
127.0.0.1 coolness.com
Have fun.
Heres a neat way:
ifconfig [E] alias [NEW IP ADDRESS] netmask 255.255.255.255
eg.
ifconfig en0 alias 10.1.1.11 netmask 255.255.255.255
If you need to have a dedicated hostname to a IP address, then edit /etc/hosts
add a new line
[IP ADDRESS] [HOSTNAME]
Remember to press TAB to separate the IP address and the hostname.
eg
127.0.0.1 coolness.com
Have fun.
Wednesday, November 19, 2008
gunbasic-js v0.3 - automatic ajax library
GunBasic-JS 0.3
The tag name change - Automatic Ajax Library.
Version 0.3 is out, whats new is the ability for autoajaxcall function to specify which function to trigger upon starting the process & which function to trigger upon successful completion.
This is really a cool library, just 1 line, cant get better than that.
code.google.com/p/gunbasic-js/
Have fun.
The tag name change - Automatic Ajax Library.
Version 0.3 is out, whats new is the ability for autoajaxcall function to specify which function to trigger upon starting the process & which function to trigger upon successful completion.
This is really a cool library, just 1 line, cant get better than that.
code.google.com/p/gunbasic-js/
Have fun.
Subscribe to:
Posts (Atom)