Share This

Sunday, 19 June 2011

A matter of opinion





Culture Cul De Sac By Jacqueline Pereira 

A person’s views are shaped by perceptions and thought processes personal to him.

COLUMNISTS often receive responses to their articles, from people moved to agree or (sometimes vehemently) disagree with views published the previous week. Either way, it’s all part of the process of expression and exchange.

Dissenting opinions are invaluable, as they open our eyes to different reasoning and new lines of discussion. And, in a country like ours, the variety of opinions astounds, from the absurd that amuses to the profound that provokes.

Adding to this colourful discourse are the quirky conclusion, the untested premise, the unaccepted assertion.

Which is a perfect recipe for a lively, entertaining debate. If we genuinely have an opinion.

Unfortunately, as Oscar Wilde once said: “Most people are other people. Their thoughts are someone else’s opinions, their lives a mimicry, their passions a quotation.”

But diverse opinions add to a delightful cauldron that is society, constantly cooking, spouting a range of views in its steam.

On a wider scale, public opinion refers to attitudes and positions collectively adopted by a group of people. In many cases these shared opinions contribute to policy-making, either in their communities or the country itself.

A case in point is the Arab Spring. Months after the first stirrings in Tunisia and Egypt, affected governments in the Middle East and North Africa (collectively known as MENA) are still reeling from the effects of not reacting earlier to the voices of their citizens. Despite the clampdowns and killings, large numbers across Mena continue to demand that their opinions be heard and respected.



Individual opinions matter, but we must remember that personal opinions are firstly that – personal – and are based on a person’s perceptions and thought processes. And it can come as a surprise that we don’t see eye to eye with someone, or follow his train of thought. When we try to think like the other, our thought train comes to a halt.

The unappreciated beauty of opinions is that they matter most to the person who utters them. Listeners are allowed, as they wish, to gauge, judge and accept the proffered view. But opinions can change. All the time.

Take fashion as an example. We may be lusting after a fashion item – like a Fendi Silvana handbag this season – while making dramatic plans to acquire next season’s Burberry Grainy Leather Tote (in red). And that’s all right.

The much-maligned Obedient Wives Club, too, has a right to its opinions. Derided it may be, but its founders and followers have their beliefs, and they choose to stand by them. We, as listeners, are free to disagree.

To cultivate an open mind, it is imperative to question every opinion. Just because some people say it louder, go on about it longer, or keep repeating their views over and over again, it does not mean that what they say is right.

Opinions must be met with some measure of doubt, no matter how convincing the orator. A well-argued opinion, backed with indisputable facts, may change your view. But it can often also be used as a vehicle for an orator with his own agenda – as in the case of a smooth salesman who’s out to sell refrigerators to Eskimos.

Putting forward an opinion involves the art of persuasion, not polemic, not put-down, not a litany of facts. Aided by a coherent thought process, building from experience and backed with information, an opinion enables an individual to take a stand.

Naturally, opinions differ. This is most evident in political systems worldwide. Each side of the divide shores up its support. What matters most here, though, is that the protagonists do not stop talking – and listening – to differing views. There is evidence that we become more entrenched in our opinions if we only interact with people of the same persuasion and, as a result, narrow rather than broaden our view.

It is the skill of speakers to persuade people and rally them to their way of thinking. Meanwhile, people have to decide on their own, based on what they hear. In the end they make up their own minds, drawing on their own values and experiences.

Lastly, let’s not forget that to hold an opinion is an act of courage. Especially if you are going against the grain or ruffling a few feathers. Even the thought of an unconventional opinion is enough to get some people bristling, bursting at a moment’s notice to counter the argument vehemently.

But there is a difference between a person with an opinion and an opinionated person.

So, before responding, it is best to think and reflect, and definitely not be afraid to have an opinion. And let others have theirs.

As the 18th-century French writer and philosopher Voltaire said: “I may not agree with what you say, but I will defend to the death your right to say it.”

People, places and perceptions inspire writer Jacqueline Pereira. In this column, she rummages through cultural differences and revels in discovering similarities. Check her out on Facebook.

Saturday, 18 June 2011

Hackers, not all hack for the heck of it! Who are the anonymous hackers? Beware of Seduction!





By HARIATI AZIZAN sunday@thestar.com.my

Some do it for fun or fame, others to make a political statement. But a bigger number of hackers are now doing it for money.

THEY brought down the CIA website and attacked Sony, Nintendo and a few tech companies with links to FBI and the US Senate. They wanted to expose the online weaknesses of these entities, “for the Lulz”, they bragged.

But what is grating the American authorities and security experts most about the group who carried out the cyber attacks, Lulz Security, an offshoot of the notorious activist hacker group Anonymous, is that they used basic hacking “tools” available for free online.

One irate network security expert, Paul Ducklin of Sophos, even branded them “a bunch of schoolboys” who did something as intellectually challenging as “boasting in the playground about who's got the hottest imaginary girlfriend”.

 
Beware: A hacker group threatening to attack Malaysian government websites.

It sounds like sour grapes to me, laughs a local IT student and part-time hacker who only wants to be known as “W”.

“This is the democratisation power of technology; it is now easy for anyone to start hacking,” he says.

Technological advancement has inadvertently lowered the bar for hacking, concurs Nigel Tan, the Asia-South principal consultant at online security company Symantec Corporation (Malaysia).

“In the past you have to write the programme yourself. Now there are toolkits available online, and you can create your own malware easily using these toolkits,” he says.

Symantec believes that the availability of these kits are likely responsible for the increase of malicious attacks on the Internet.

As its recent Internet Security Threat Report showed, there were more than 286 million new cyber threats last year, compared with 120 million in 2008.

But you don't really need statistics to show how rampant cyber attacks are growing.

Since last December, the world has been bombarded by a flurry of hacking incidents the highest-profiled possibly being the hacking of PayPal, MasterCard, and Visa by Anonymous in support of WikiLeaks' Julian Assange.

In March, the database of marketing group Epsilon was rampaged and millions of email addresses were stolen. In April and May, Sony's PlayStation network was attacked, more than once, exposing some 77 million users' data.

And in the past three weeks, the security of the International Monetary Fund, CitiBank, the Spanish police, Google, the CIA and our own government websites was breached.

While many of the hackers prefer to remain in the dark corners of the Internet, there seems to be an increase of groups like Lulz and Anonymous who want to grab their 15 minutes of fame for their hacking activities.

New breed

In their claim to fame, Lulz went as far as to open up a hotline to get public suggestions for their next target. The hotline number is said to spell out LULZSEC and callers are reportedly greeted by a male voice heavily tinged with a French accent, which then apologetically explains that “Pierre Dubois and Francois Deluxe” are unavailable because they are “up to mischief on the Internet”.

The group is obviously relishing the limelight, publicly taunting the authorities, not even bothering to hide (or purposely exhibiting) their telephone area code.

Despite their pop cultural references they use the Guy Fawkes masks popularised by the comic book and movie V for Vendetta for their public image Anonymous is less playful.

The “hacktivist” group's activities are self-proclaimed as acts of political activism. In its attack on the Malaysian government websites, for instance, Anonymous announced that it was a protest against the Government's decision to block a few file-sharing websites, which they claim is an infringement of Malaysians' human rights.

The open stance aside, the real identities of these two groups are difficult to detect, as international security personnel who have been tasked to trace them are discovering.

Anonymous, which has been around for almost a decade, for one, is a loose group made up of an indefinite number of members.

As one admirer was quoted: “If you claim you are a member of Anonymous, then you are a member.”

There is a cautionary tale on the web of how one man, HBGary Federal chief executive officer Aaron Barr declared war on Anonymous, only to find himself at their mercy.

In February, Barr had claimed that he had successfully uncovered the real identity of the group's top honchos and announced that he would expose them. Before he knew it, his website was hacked and his database compromised. Important files were deleted while his phone system was crosswired.

Anonymous also took control of the company's email, leaking confidential business emails and dumping thousands of others. The whole attack cost HBGary Federal million-dollar losses and he retracted his claims.

As Anonymous announced later, the company was taken down by five of its members, which included a 16-year-old girl, another slap in Barr's already burning face.

A young Malaysian hacker who only wants to be known as Ahmad shares that many of his peers look up to Anonymous not only because of their political activism but also their technical prowess.

Says the IT student, “It is now easy to hack into different systems, but it is not easy to cover your tracks. Anonymous is master at it.”

Ahmad, however, concedes that he finds it strange that Anonymous has targeted Malaysia. “Sure, they have clearly stated their intentions, but I am still trying to wrap my mind around what it has to do with them. Why is Malaysia important to them?”

W believes that the web may be the final frontier for activism, as promoted by Anonymous and the growing breed of hactivists. “In the last few years, the Internet has been a useful tool for activists to get their message out and to mobilise supporters. Maybe now it is time to carry out their activism campaign in cyberspace itself.”

When asked if he had taken part in the recent Anonymous-initiated cyber attack on Malaysian government websites, Ahmad profusely denies any involvement, but he admits that he and his friend have hacked into other websites before.

“We like to challenge each other, as a test of our IT skills. Many of us do it for fun, just to see if we can get in. We don't steal the data or do any other harm. We have also hacked for classroom lessons' after being assigned tasks of hacking into a few websites to learn about cybersecurity,” he reveals.

For many young hackers, he says, many do it to get noticed by security firms.

“It is still a new area and there are not many professional' hackers those who work with security firms to hack into their systems after they install it to ensure that the systems are really secure. Then there are companies who hire hackers to test the security of new programmes. Our hacking activities are like our auditions or resumes,” he shares.

Symantec's Tan, however, alerts that while these so-called harmless “fun hacking” and hacktivism activities appear to be growing, a bigger number of hackers are doing it for money lots of it.

“I believe that in the last few years, there was a major shift in hacking those who are doing it for fame or fun have decreased. Now hackers are doing it for money. It is big business. Those who are making a big noise are the minorities; more prevalent are those who are involved in the underground economy activities. They are more quiet and targeted in their attacks and would rather keep below the radar so that they can continue their work longer,” he cautions.



Who do the anonymous hackers represent?

THE STAR SAYS

THE flap over the hacker attack of the Malaysian Government's portal has come and gone as swiftly as the click of a mouse.

However, the scale of the problem and the magnitude of the issues around it remain considerable.

To avoid unnecessary confusion, it is important to spell out the issues at stake before dwelling on the justness or otherwise of any particular motive.

In this specific instance, the hackers in the collective international identity of Anonymous had targeted the official websites of a sovereign nation.

Since it was not an attack on a political party or individual personalities but on an entire country's online representation, the hackers are culpable of anything from vandalism to subversion.

The attack was also not against any sinister policy of the Government but rather against its obligated move to block file-sharing websites that allow unlawful downloading of films and music.

Thus Anonymous is merely a group of selfish persons seeking to benefit personally from the work of professional artistes at the latter's expense.

Their motivation was therefore neither just nor defensible.

They are an accessory to illegal and unethical activities, if not also guilty of those activities themselves.

The fact that Malaysia became the first country in the region to block file-sharing websites does not detract from the rights and wrongs of the issues.

A country such as Malaysia has been besieged by various parties clamouring for better enforcement of laws against copyright piracy.

Whatever the record of such enforcement on the street, the clampdown on illegal file-sharing websites is certainly a plus especially when most infringements these days are being committed this way.

At the same time, for a government to resist Internet censorship despite the temptations is definitely commendable.

Attempts to liken Anonymous to Wikileaks are also grossly misplaced.

Wikileaks did not try to deface or destroy websites or to steal official secrets, but only to relay information of public interest to the public domain against the wishes of governments claiming to work for the public.

If hackers had any righteous values or morals, they would have applied their skills to attack websites spewing race hatred and child pornography, among others.

They fact that they do not, and that they have had to remain anonymous, speak volumes about their lack of scruples.

Seduction on the web

LIKE the spider luring the fly into his web, hackers are “seducing” their victims and luring them to their websites.

A major way for cybercriminals to obtain confidential data is by creating fake websites to host malicious software (malware) or to trick you into providing this information (phishing), says Nigel Tan, the Asia-South principal consultant at online security company Symantec Corporation (Malaysia).

Symantec's study shows that spikes in hacking and phishing occur during major events in the world, like the recent British Royal Wedding or the tsunami tragedy in Japan.


Hackers take advantage of these events to get people to click on links to their fake websites so that they can steal people's confidential information.

“It is human nature to get the latest update of an important global event or to see pictures of a tragedy. Hackers exploit this by sending emails with links for pictures or stories on the event or tragedy,” he says.

“When someone clicks on the link, they will be taken to the fake website where their confidentiality will be compromised or their computer may be affected.”

However, it remains a challenge to determine whether a website is genuine or fake other than the obvious spelling and grammatical errors (many fake websites are rush jobs) or shoddy infrastructure and programming.

Worse, sometimes you can go to a trusted website which has links to websites or advertising that may not be genuine and contain malware or phishing mechanisms.


Sometimes, all you have to do is to click the link and you will taken to a website that will affect your computer.

“We call this drive-by download,'” says Tan.

Password

Password is another easy prey for cyber criminals. With many websites out there now requiring users to register, most people are resorting to using personal information like date of birth or address as their password. Worse, people are increasingly using the same password for everything.

“It is understandable that people will not remember if they use different passwords, but the danger of using the same password for everything is that once a website or your email is compromised by a hacker, they will have access to everything else.”

Fortunately, it is not too difficult to strengthen your password, says Tan, advising people to use at least eight letters in a combination of capital letters, small letters, numbers and symbols.

If you use the same password, you can have variations on it by adding different letters or numbers or symbols, the significance of which should only be understood by you.

“Another effective safeguard is to segmentise your passwords by having one set of password for communication, another set for websites and another for banking and shopping online,” he elaborates.

Technology has also enabled hacking activities to be more targeted, so like those living in big houses in affluent areas who are targeted by burglars, those with bigger bank accounts or higher profiles, for instance, will be more susceptible to cyber attacks and need to be more vigilant on the Net.

Botnet alert

Another growing threat is hackers using our identity or computer to launch an attack.

Citing the recent gov.my hacking as an example, Tan says that while an individual may not be a direct focus target of most hackers, they may be a part of the attack without realising it.

The more common modus operandi is for hackers to use our personal information to get access to their target website. A method that is growing rampant is to control our computer to do their dirty work.

Explains Tan: “Now, hackers do not create malware to crash the computer, they want it to be alive. What they do is to plant malware called botnets (which are like sleeper spies) that will stay quietly in the background in your computer until they are activated by the Master to hack into official websites or to send spam emails that will phish information or crash a website.”

For example, if a hacker wants to spam people, they will just activate the malware they have planted in the different computers around the world and something like a pyramid scheme will be at work (the number of spams spread exponentially).

“The computer owner may not be doing anything but his or her computer will be hard at work. This trend is growing, especially now with broadband; so many people are connected 24 hours a day, even when they are asleep,” says Tan.

It is thus vital that people ensure that their computers are well-protected.

“One thing to remember is that although it is getting easier for cyber criminals and hackers to attack us, it is also getting easier for us to protect ourselves. The problem is that people just don't do it,” he notes, adding that it is also important to ensure that your software and programmes are up-to-date as older computers with outdated software are the most prone to attacks.

Ultimately, he stresses, it boils down to common sense.

“Typically, you won't walk into a dark alley or you won't give a stranger your IC number, so you should not do the same on the Net,” says Tan.

Related Stories:

Tackling cyber piracy needs careful planning; Hackers mainly locals

Malaysia Websites hacked but not whacked after threatened; time to build secured websites!

Beware of criminal hackers   

Meet the good hackers

Friday, 17 June 2011

Social Media Isn’t Free to Entrepreneurs or Anyone





Martin Zwilling
 By Martin Zwilling

Webtreats 108 Free Glossy Orange Orb Social Me...If you are an entrepreneur today, and not using social media to promote your business, you are missing out on a huge opportunity. But, contrary to what most people preach, it isn’t entirely free. Most social media outlets don’t require a subscription charge, but they certainly require an investment – in people, in technology, your reputation, and your time.

There are hundreds of consultants out there who will take your money for guidance in this area, but I recommend that you start with some free resources on the Internet, or one of the many recent books on this topic. One I just read, “How to Make Money with Social Media” by Jamie Turner and Reshma Shah, Ph.D., hits all the right points from my perspective:
  • There are risks as well as benefits. As with many startup activities, you only have one chance for a great first impression. You can jump into social media with a poor brand definition, poorly focused content, unrealistic expectations of customer service, or be killed by malware or viruses.
  • Assess social media relevance to your product or service. If your business is industrial B2B products, social media should be low on your list. Spend your time and money on other platforms. If you are selling to consumers, especially younger ones, your business won’t survive without an effective social media presence.
  • Attracting key stakeholders requires sensitivity. For some customers and many investors, a heavy focus on social networks and viral marketing may be a negative, rather than a positive. A balance of conventional and social communication and marketing is always advised.
  • Pick the right platform for your business. Within each of the platform categories defined above, there is a right one and a wrong one for your audience. For example, LinkedIn is attuned to business professionals, Facebook is dominated by the social and upwardly mobile crowd, and MySpace is for tweens and creative types.
  • Communication and writing skills are required. Heavy texting experience is not a qualification for communicating via social media. In additional to strong journalistic writing and storytelling, you need business acumen, strategic thinking and planning, and the ability to do the right research. These days, video production is also a useful skill.
  • Make social media an integrated part of an overall strategy. An integrated marketing strategy starts with an overall brand management strategy, delivered through online and offline communications, promotions, and customer engagement vehicles. Your Twitter YouTube messages better match your print advertising message.
  • Find the right tools to analyze the ROI. Return-On-Investment metrics are not new, but the tools are different. Get familiar with current social media tools, such as Google Analytics, Omniture, and HootSuite analytics. Over time, put together the data you need to measure your progress on a weekly/monthly/yearly basis.
The key social media platforms today include communications (WordPress blogs, Twitter), collaboration (Wikipedia, StumbleUpon), and multimedia (YouTube, Flickr). In looking ahead, don’t forget the mobile platforms (iPhone, Android), and location-based services (Foursquare, Gowalla).
As with any resource or tool, you need to optimize your social media costs against a targeted return. That means first setting a strategy and plan for what you want to achieve, then executing the plan efficiently, and measuring results. It’s not free, but it’s an investment that you can’t afford not to make.

Newscribe : get free news in real time