Skip to main content

Posts

Showing posts from August, 2008

Whaddya Know where to register a cheap domain name?

This is a guest post from our sponsor NeedName.com

---

NeedName.Com sells domain name registrations with a premium service set all included in the discount price of the registration. You will find our domain names and services to be one of the best values around. The cost to own a domain name is only $8.88/year for .com .net .org .info .us .biz, please visit our website for other domain name extension we offer.
We also offer .TV registration, renewal and transfer for only $23.95/year, the lowest in the industry.

Our Objective: To provide low cost ownership and central management of your domain names.

Our Technical Services has 15+ years of service experience in IT Consulting and helping our customers to bring the best for their company. We share our expertise in Networking Design, Email and DNS management, Security, Hosting, Parking Domain services and FREE Social Networking Tool for .TV registration.

We have MCP, MCSA & MCSE Certified Staff. Please send an email to Customer Service if …

Whaddya know? Google Ad Manager provide tool to manage your online ad sales and inventory.

Great to know that Google is now providing free ad manager just like having your own hosted open source ad manager (phpad). The service is still in beta and currently a free service to use. I'm hoping that they will offer this service free of charge after the beta stage. Here's a few words from Google Ad Manager.

====
Google Ad Manager is a hosted ad management solution that can help you sell, schedule, deliver, and measure all of your directly-sold and network-based inventory.

Simple, intuitive user interface: Decrease training time and trafficking steps with simplified tagging and inventory management.
Google serving speed and reliability: Ensure quicker ad delivery and fewer reporting discrepancies.
Significant cost savings! Pay no I.T. infrastructure, maintenance, or bandwidth costs.
Take a tour of Ad Manager:
https://www.google.com/admanager/login/en_US/tour.html
Try it now, you can use your existing adsense account: http://www.google.com/admanager

Whaddya know? Wardrive.com Wardriving after six years.

It's been six years after learning wireless security and it's vulnerabilities. My team (WirelessCon members TheWatcher, Chris, wetw3rx and dataworm) won the first wardriving contest in Defcon Las Vegas Year 2002 and 2nd Runner-up for Year 2003. I have no contact with the rest of WirelessCon team since 2003. I hope they are doing good.

Some of the tools for Wireless Security:
Freeware for Windows:
Aerosol has been tested to work on D-Link, LinkSys, Belkin, US Robotics, SMC, Netgear, HP HN210W USB and Intel Anypoint Wireless ApSniff has been tested to work on DWL-650 and LinkSys, it requires you to manually change the SSID to blank.Network Stumbler works on the following cards using the Hermes chipstes such as Lucent Technologies WaveLAN/IEEE(Agere ORiNOCO), Dell TrueMobile 1150 Series (PCMCIA and mini-PCI), Avaya Wireless PC Card, Toshiba Wireless LAN Card (PCMCIA and built-in), Compaq WL110, Cabletron/Enterasys Roamabout, Elsa Airlancer MC-11, ARtem ComCard 11Mbps , IBM High Rate…

Whaddya think? High Definition Television

High Definition Television

HDTV is high definition television and it can make an enormous difference in your television viewing experience. Many consumers describe the HDTV experience as being closer to watching a movie in the theater than watching a standard television set. HDTV offers a digital picture with a higher resolution than normal television screens. The higher resolution results in a clearer, crisper picture. It also offers the ability to watch widescreen movies and programs without the annoying black bars that your regular television displays. It is the way the movie directors intended you to watch their films. With HDTV, you will be in on even more of the action of your favorite program. Currently with your regular color television, waves are scanned at 480i. This means that at any given time there are 480 lines of picture being sent to your television screen by your service provider. Odd lines are displayed, followed by even lines. The change happens so quickly, the huma…

Whaddya know? Gadget Tips -Casio EX Z80 maximum video length.

With Casio EX-Z80 8.1MP using 1GB SD card, you can record at least 30 minutes.

If you use the SDHC, for 4GB or 8GB you can record approximately 2 hours and 4 hours of maximum video length. Not bad for this small gadget.

Casio EX Z80 8.1Mp
http://astore.amazon.com/king.net-20/detail/B0014V0VOY/105-9451553-9893269

Casio EX Z80 10.1Mp
http://astore.amazon.com/king.net-20/detail/B0012BDFQW/105-9451553-9893269

Enjoy and post your comments here.

Warning message when you start Outlook 2007 and then connect to a mailbox that is hosted on an Exchange 2007: Security certificate is invalid.

I've search the Internet to find the solution with my user running Outlook 2007 connecting to Exchange Server 2007 and no success, untill this article. Here's the summary of my tasks.

SYMPTOMS
When you start Microsoft Office Outlook 2007 and then connect to a mailbox that is hosted on a mailbox server that is running Microsoft Exchange Server 2007, you receive the following security warning message:

The name of the security certificate is invalid or does not match the name of the site.

CAUSE
You replace the default self-signed Exchange 2007 certificate with a different certificate.

By default, the URL that is stored in these objects references the NetBIOS name of the server. For example, a URL that resembles the following URL is stored:

https://NetBIOS_name.contoso.com/autodiscover/autodiscover.xml

This may differ from the host name that is used in the FQDN of the replacement certificate. For example, the replacement certificate may have an FQDN that resembles the following FQDN:

mail…

Whaddya mean? What is Cyberbullying?

Cyberbullying is the deliberate and persistent harassment of an individual or a group of individuals using one or more Internet-based communication methods. Teenagers and pre-teens are the typical targets of cyberbullies, with the initiators often being peers. Cyberbullying can cause severe self esteem problems for their victims, sometimes leading to tragic results.

Cyberbullying can consist of spreading lies and rumors about a person, insulting and targeting a student's sexuality, physical appearance, deceiving students into revealing personal information and then publishing it, and/or posting personally identifiable information or photos without the victim's consent.

Cyberbullies employ a number of methods to threaten, and disparage their targets. They include:
Email messages: While this is the most common form of electronic communication, the use of this method for cyber bullying is less pervasive since most e-mail programs allow the use of filters to block offending e-mails. …

Verizon Wireless Broadband - Novatel Wireless USB727

I'm testing the Verizon Wireless Broadband using USB727 modem developed by Novatel Wireless. So far my experience is not amusing compare to Compass™ 597 by Sierra Wireless (Sprint broadband service). My personal experience of using Verizon wireless broadband is slow compare to Sprint.

I get 1.5-2Mb download and 500-600kbps for upload using Sprint broadband, while Verizon only give me around 1Mb-500kbps download and 100-500kbps upload. Working while in metro subway from Washington DC to Vienna VA, I have 50-60 percentage connection to the Internet. In open space, I prefer to use Sprint broadband wireless for Internet speed. I rarely disconnect to the Internet. The installation approach of Sprint is user friendly. When you plug in your Compass™ 597 by Sierra Wireless to your laptop USB drive. It will automatically detect if you need to install the software. The installation process is straight forward, just accept the default setting and you're set. If you have existing Sprint View…

Money: Trusting a pro with your nest egg

I read this article today and would like to share with you. Very interesting information regarding your financial planner.

Rule of thumb: Never sign your papers on your initial meeting with your financial adviser. It is important to sleep on it, check things out. I guess this is applicable to every life changing decision.

---
NEW YORK (Money) -- Question: I recently retired and visited a Certified Financial Planner on the advice of a friend. He developed a portfolio for me, at no charge, and presented me with an investment plan for a fee of 1.35% per annum. I scrutinized all the paperwork he sent me. It seems that in addition to the 1.35%, there are a number of hidden fees, including various fund fees within the portfolio that he said nothing about. What should I do?

The Mole's Answer: The first thing you should do is pat yourself on your back. I can tell you that I've never actually met anyone who scrutinized all of the paperwork their financial planner sent them, before entering…

Gadget Tips: Looking for small camera with video capability under $200 budget.

Advanced Installation with Port Forwarding - Vonage VOIP Internet Phone

Ok I've changed my phone service from Verizon to Vonage to save some $ to my pocket. The setup takes a while due to my firewall configuration preventing Vonage to establish connection.

If you're geek enough to configure your cable modem, then here's a simple guide to customize your Firewall policy to allow Vonage service or VOIP service to go out. And if you can't configure your Firewall, I suggest that you get in touch with your local computer tech guys for assistance.
I have a cable modem SBG900 Surfboard Gateway configuring the firewall using the following policies:
Outgoing Policies
VONAGE_dns Port 53 UDP VONAGE_tftp Port 21, 69, 2400 UDP VONAGE_http Port 80 UDP VONAGE_ntp Port 123 UDP VONAGE_sip Port 5061 UDP
Incoming and Outgoing Policies
VONAGE_rtp (voice) traffic Port 10000-20000 UDP. When a call is made, a random port between 10000 and 20000 is used for RTP (Voice) traffic. Post your comments. Thank you.

HOWTO: Transfer outlook cache "to" field to new computer?

How to transfer outlook cache to a new computer?

I always forget this information so I blog it here and share to the world.

You just need to copy one file e.g. outlook.nk2 to your new computer and you will have your outlook cache file again.

Where to find the outlook.nk2 file?
The default location should be in your profile Outlook folder, here's the example path.
c:\Documents and Settings\loginname\Application Data\Microsoft\Outlook

where; the loginname is your user information when you login to your workstation.

How to transfer outlook.nk2 file to your new workstation?
You can use the following information on how to transfer file(s).
The easiest approach, use USB drive to copy and tranfer file from one computer to another.Send the outlook.nk2 file as attachment using your email. Read this email to your new workstation and save the file to the outlook folder.Shared folder to copy fileCall your local computer geek to help you.Send me e-mail. I normally reply within 2-8 hours.And to delete …

HOWTO: Transfer outlook cache "to" field to new computer?

How to transfer outlook cache to a new computer?

I always forget this information so I blog it here and share to the world.

You just need to copy one file e.g. outlook.nk2 to your new computer and you will have your outlook cache file again.

Where to find the outlook.nk2 file?
The default location should be in your profile Outlook folder, here's the example path.
c:\Documents and Settings\loginname\Application Data\Microsoft\Outlook

where; the loginname is your user information when you login to your workstation.

How to transfer outlook.nk2 file to your new workstation?
You can use the following information on how to transfer file(s).
The easiest approach, use USB drive to copy and tranfer file from one computer to another.Send the outlook.nk2 file as attachment using your email. Read this email to your new workstation and save the file to the outlook folder.Shared folder to copy fileCall your local computer geek to help you.Send me e-mail. I normally reply within 2-8 hours.And to delete …

Mailing list service e.g. Constant Contact, Benchmark, StreamSend, etc.

Here are a few list to select for Newsletter or Mailing list.
Constant Contact web: http://www.constantcontact.com/Benchmark Email web: http://www.benchmarkemail.com/StreamSend web: http://www.streamsend.com/AWeber communication web: http://www.aweber.com/If you want to try out a free service, check this out:Feedblitz.com web: http://www.feedblitz.com/If you knew other mailing list service and you would like to share to other people, please comment here or send e-mail to EM @ KING.NETThank you.

Mailing list service e.g. Constant Contact, Benchmark, StreamSend, etc.

Here are a few list to select for Newsletter or Mailing list.
Constant Contact web: http://www.constantcontact.com/Benchmark Email web: http://www.benchmarkemail.com/StreamSend web: http://www.streamsend.com/AWeber communication web: http://www.aweber.com/If you want to try out a free service, check this out:Feedblitz.com web: http://www.feedblitz.com/If you knew other mailing list service and you would like to share to other people, please comment here or send e-mail to EM @ KING.NETThank you.

Gadget Tip: Block the bad sites and whitelist the good.

Objective: To provide a basic security while surfing the Internet.

An ordinary user doesn’t know how to protect their workstation while surfing the Internet. This article will help you to close some of the security hole that you don’t know about.

What to expect when you buy your new workstation or laptop?
They only sell you the computer (e.g. desktop or laptop, accessories) with operating systems, a 30-60 days demo software’s of Anti-Virus and Microsoft Office package. Meaning after the demo period, you need to purchase a license for your computer.

What is needed?
You need to have updated Anti-Virus software e.g. Symantec, McAfee, etc. to protect your computer against new viruses.
You need to purchase a Microsoft Office with Word, Excel, PowerPoint and Outlook. The MS Access database is optional

What basic security you need for your computer?
Check your anti-virus software for latest update, daily update is recommended.
Run Windows Update once a month for security update.
Enable the Firewall se…

DNS - Cross-Pollination Check

Internet Assigned Number Authority (IANA) provides a web version to check if your DNS name servers are not recursive. Visit http://recursive.iana.org/ to check your website name server. All you need to do is submit your domain for the system to analyze it. For example, king.net then click Submit Query.

You should see a similar results, as depicted below.
Safe.
The servers tested for KING.NET are not vulnerable to cache poisoning.


Name server - IP Address - Results
DNS1.NAME-SERVICES.COM - 69.25.142.42 - Not recursive
DNS2.NAME-SERVICES.COM - 216.52.184.248 - Not recursive
DNS3.NAME-SERVICES.COM - 63.251.92.200 - Not recursive
DNS4.NAME-SERVICES.COM - 69.64.145.225 - Not recursive
DNS5.NAME-SERVICES.COM - 70.42.37.7 - Not recursive

Disclaimer about the tool:
Notes about this tool
This tool has been implemented quickly to assist name server operators. It may have problems as it has not been thoroughly tested, so you should also perform your own tests and use this only as a guide. We appreciate any …

Highly-effective Cache Poisoning Attack

What is the issue?
A method of inserting false data into a name server has been discovered by a security researcher. This method affects recursive name servers, which are usually provided by ISPs and network operators to provide DNS service to their end users. As these types of name servers remember previous lookups in a cache, they are often called caching name servers, caching resolvers or similar.

The attack relies on the fact that an attacker can send fake DNS answers in response to a query and trick it into thinking the wrong data is correct for a given domain. The method is a specific type of cache poisoning attack. It is called cache poisoning because the server remembers the wrong answer in its cache, and then provides that wrong answer in future lookups.
While similar vulnerabilities have been discovered in the past, and have been patched in software, this attack is particularly concerning as it is far more effective. This has significantly raised the level of concern.

The cache …

One in three IT staff snoops on co-workers

One in three information technology professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal emails or board-meeting minutes, according to a survey.

U.S. information security company Cyber-Ark surveyed 300 senior IT professionals, and found that one-third admitted to secretly snooping, while 47 percent said they had accessed information that was not relevant to their role.

Source: Reuter.com

One in three IT staff snoops on co-workers

One in three information technology professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal emails or board-meeting minutes, according to a survey.

U.S. information security company Cyber-Ark surveyed 300 senior IT professionals, and found that one-third admitted to secretly snooping, while 47 percent said they had accessed information that was not relevant to their role.

Source: Reuter.com

Security News: PHP and OSS make the list

Security Woes Up, as PHP and Open Source Software (OSS) Make the List
Software vulnerabilities are up this year, especially Web browser-based ones, according to a new report from IBM Internet Security Systems. The X-Force 2008 Mid-Year Trend Statistics Report, released in late July, defined the problem broadly. A vulnerability is anything that results "in a weakening or breakdown of the confidentiality, integrity, or accessibility of the computing system."

Topping the list of companies reporting the most vulnerabilities were such tech mainstays as IBM, Microsoft, Apple and Cisco Systems. Microsoft had the third most reported vulnerabilities. However, an interesting dimension to this year's report is that open source software (OSS) or free software groups, such as Mozilla's Firefox, WordPress and Joomla, also made the list of programs with security holes in them.

Continue reading here: