Rules of Engagement in Cyberspace

Rules of engagement is a concept familiar to most military personnels worldwide. The basic premise of having rules of engagement is to ensure an appropriate level of response or reaction to a particular threat. It is sometimes also known as escalation of force. Rules of engagement for physical ...

Facebook Open Graph Tags Modification

A couple of weeks ago, I discovered that Facebook allowed you to change the title and description of links that you post. This allows you to craft some pretty interesting posts. For example: (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = ...

Google Calendar API v3

In one of my previous posts, I mentioned that I was using rainmeter to display useful information such as events in my google calendar on my desktop. Google updated their calendar to API v3 sometime early this year and this broke the functionality. After waiting few months for a fix, and ...

Open letter to ICANN on PPSAI

Subject: I may not need Domain Privacy, but others do! From: Benjamin Lim Date: Fri, 3 Jul 2015 18:12:52 +0200 Dear ICANN, I will not attempt to speak on behalf of the oppressed or the discriminated. There are already enough voices out there advocating the importance of ...

Website goes offline for 3 months

On the 6th of Mar, while performing routine maintenance on my server, bash commands suddenly stopped working. 1 2 3 4 $ pwd -bash: pwd: command not found $ ls -bash: ls: command not found At that point in time, apache web server was still running. I took the risk and asked for the server to be ...

Email fraud part 2

While still on the topic of email fraud, I would like to touch on 419 scams, which are also known as Nigerian scams. Most of us routinely encounter such emails in our spam box, so it shouldn't be too alien to us. The modus operandi for such a scam is as follows. The scam artist first crafts an ...

Email fraud

A fraudster managed to email his way out of prison. Article here. The amount of trust that a lay person puts into emails today is quite alarming. Emails were first used in the 70s, when everyone knew everyone else on the network and trust was less of an issue that it is today. There used to be ...

iPad POS

While traveling in the US, I noticed that a considerable number of smaller food establishments used an iPad Point of Sale (POS) system. Given the number of POS vulnerabilities reported in the past year, I wondered if the iPad would be a more secure POS platform compared to the traditional ...