Sat 21 Jun 2014

On Wednesday, Facebook announced “Wedge”. For layman, think of it as a crucial hardware device that transports Internet information between machines (like a networking switch).

What you don’t know is that Wedge is part of the Open Compute Project (OCP) which is being led by Najam Ahmad, the director of Technical Operations at Facebook. Najam, who was born in Karachi, Pakistan, holds a degree in Electrical Engineering from NED University of Engineering and Technology and later on went to do his Master of Science in Telecommunication Protocols and Computer Science from The George Washington University and prior to Facebook, Najam was the General Manager of Global Networking Services at Microsoft where he looked after the operations, overall architecture, design & implementation of Microsoft’s global online network.

Reinventing+the+wheel.jpg

This basically means that Facebook (and other companies who support the OCP) will be able to use and contribute to the open hardware design of these switches and this is bad news for vendors like HP, Dell and Cisco who basically have the monopoly over the $150 billion data center hardware market.

Najam’s role in this whole project, though limited, gives us hope and motivation as there are still hundreds and thousands of engineers here in Pakistan who dream of going to the Silicon Valley and making an impact that can change the world and now they have someone to look up to.

Source:linkedin.com/today/post/article/20140620191201-40259989-meet-the-pakistani-who-is-reinventing-the-internet-well-kind-of

E-mail this post to someone or Comments here
Sun 2 Dec 2012

A Urdu TV program Sar-e-Aam goes live about Secret videos of Girlfriends and blackmailing of girls females whose personal photos or videos shared and spread on social media facebook or on internet youtube etc by her boyfriend or other people who get into these stuffs.

Think before you get into extra marital relation or love and having photos or videos.

 

Categories : Thoughts / Lessons
E-mail this post to someone or Comments (3)
Thu 18 Mar 2010

Watch this video. Think before you post on Facebook. Specially for girls.

Precautions required if you want to be safe in this evil world.

Be Careful & Take Care...

 

======================================================================================================== 

========================================================================================================


To control your privacy that only the person you know can view your posts, photos, and other personal information, follow the following instructions

 Click on Account link on top right corner of facebook page. Then click on Privacy Settings, following page will be displayed.

 

Facebook+Privacy+2010+a.JPG

 

To set privacy settings of your personal information, click on Personal Information.

To set privacy setting of your contact information, click on Contact Information

 

Facebook+Privacy+2010+b.JPG

 

 

 

Set all drop down value to Only Friends by selecting it after click on the dropdown. So only your friends can see your personal / contact information.

 

Facebook+Privacy+2010+c.JPG

========================================================

 

Facebook+Privacy+2010+d.JPG

 

 

Hope this will help you to secure your personal information to some extent.


Be aware of the Evil World. Think before you post, any where, over the Internet

 

 

 

Categories : Thoughts / Lessons
E-mail this post to someone or Comments here
Fri 10 Apr 2009

Being a facebook developer, i think following information will be helpful for users.

Security related to Applications

Privacy is always an important factor in personal life and behaving.

If any female or male doesn't want to share his or her photos or albums or some personal information on facebook with unknown personals through the applications they add/allow weather for any reason or in fun, which are vulnerable to misbehavers, then don't forget to set its applicaion privacy setting at following locations :-  Click on

1) Settings (from top facebook menu -> Privacy Setting -> Applications -> Overview
 
Here read the short important overview. It will not take your important minutes.


2) Settings (from top facebook menu -> Privacy Setting -> Applications -> Settings 

Here set your required settings. Do you want to share your photos and other personal information with the application, who's owner and developers are unknown and stranger to u, are you sure? No, so set your settings by removing check marks and save.

 

Be choosy in adding/allowing Applications - Be Safe

 


 

facebook privacy application setting 1.jpg

 




facebook privacy application setting 2.JPG

 




facebook privacy application setting 3.JPG

 




facebook privacy application setting 4.JPG

 




facebook privacy application setting 5.JPG

 

Are you sure you want to share your photos and personal information to persons who you dont know and to strangers?, If no then set your privacy settings now!

 

For Facebook photo and album privacy setting, click following link
http://faisalmb.com/blog/post/2008/12/Facebook-Privacy-Setting.aspx

 

E-mail this post to someone or Comments here
Wed 18 Mar 2009
Yeh Document, Yeh Meetings, Yeh Features Ki Duniya
 
Yeh Insaan Ke Dushman, Yeh Cursors Ki Duniya
 
Yeh Deadlines Ke Bhooke, Management Ki Duniya
 
Yeh Product Agar Ban Bhi Jaaye To Kya Hai?
 
Yahaan Ek Khilona Hai Programmer Ki Hasti
 
Yahaan Basti Hai Murda Bug-Fixers Ki Basti
 
Yahaan Par To Raises Hai, Inflation Se Sasti
 
Yeh Review Agar Ho Bhi Jaaye To Kya Hai?
 
Har Ek Keyboard Ghayal, Har Ek Mouse Hay Pyasa
 
Excel Mein Uljhan, Winword Mein Udaasi
 
Yeh Release Agar Ho Bhi Jaaye To Kya Hai?
 
Jalaa Do Ise, Phoonk Do Yeh Monitor
 
Mere Saamne Se Hataa Do Yeh Manager Ki Moorat
 
Tumahaara Hai Tumhi Sambhaalo Ye Computer
 
Yeh Product Agar Chal Bhi Jaaye To Kya Hai?
 
 
E-mail this post to someone or Comments (5)
Wed 18 Mar 2009

A Hero with Heroin on Chat

 
Hero: Hey...GM (Good Morning)... How's u doing today?
 
Heroin: VGM...Day is going good and it got better having found u on chat
 
Hero: wow...am honored, u know what, my day starts only when I find you on Chat
 
Heroin: Yep...me too feel the same...Brb (be right back)'ll get some Coffee.
 
Hero: OK
 
(Hero waits impatiently. Meanwhile, his manager comes to his seat.)
 
Manager: Hey, I need some help from you
 
Hero: [**** She always comes at wrong time] Yeah tell me
 
Manager: Could u write a program for me which generates nth prime number,Given value of n. Would you give  this by today evening?
 
Hero: I would do that, but I think it's quite hard, is it ok with you, if I Give it by tomorrow evening.
 
Manager: Yeah, that would be fine. Thank you [Leaves the place]
 
(Our hero sighs and stares at his monitor waiting impatiently for heroin to Arrive.
 
All of a sudden smiles on his face. Over to chat window...)
 
Heroin: Hey, am back
 
Hero: cool, you know what my manager does, she's kinda..... keeps asking stupid Things, tries to give me stupid work
 
Heroin: Yeah, it's the same everywhere. Real sick ppl these managers are!!
 
Hero: Yep, u rite!!
 
Heroin: Hey, can u do me a favor
 
Hero: *smiles* sure, why not.
 
Heroin: Hey, I want you to write me a program to print nth prime  Number, given N. Would you give that to me by tomorrow evening? Plzzz. You know it's real Urgent for me to work this out
 
Hero: hey, that's a one-hour's work. Sure check Ur mail in an hour from now.ok?
 
Heroin: THAT WAS THE SAMETHING I ASKED U WHEN I CAME TO YOUR WORK PLACE. YOU  KNOW WHO I AM NOW!! YOUR 1 HOUR TIME STARTS NOW!!
 
 
E-mail this post to someone or Comments here
Tue 27 Jan 2009

Experts are warning that hackers have yet to activate the payload of the Conficker virus.

Clock ticking on worm attack code.jpg

The worm is spreading through low security networks, memory sticks, and PCs without current security updates.

The malicious program - also known as Downadup or Kido - was first discovered in October 2008.

Although the spread of the worm appears to be levelling off, there are fears someone could easily take control of any and all of the 9.5m infected PCs.

Speaking to the BBC, F-Secure's chief research officer, Mikko Hypponen, said there was still a real risk to users.

"Total infections appear to be peaking. That said, a full count is hard, because we also don't know how many machines are being cleaned. But we estimate there are still more than 9m infected PCs world wide.

"It is scary thinking about how much control they [a hacker] could have over all these computers. They would have access to millions of machines with full administrator rights.

"But they haven't done that yet, maybe they're scared. That's good news. But there is also the scenario that someone else figures out how to activate this worm. That is a worrying prospect."

Experts say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch. The patch is known as KB958644.

 start_quote_rb.gif Even having the Windows patch won't keep you safeend_quote_rb.gif
Graham Cluley
Sophos

Speaking to the BBC, Graham Cluley, senior technology consultant with anti-virus firm Sophos, said the outbreak was of a scale they had not seen for some time.

"Microsoft did a good job of updating people's home computers, but the virus continues to infect business who have ignored the patch update.

"A shortage of IT staff during the holiday break didn't help and rolling out a patch over a large number of computers isn't easy.

"What's more, if your users are using weak passwords - 12345, QWERTY, etc - then the virus can crack them in short order," he added.

"But as the virus can be spread with USB memory sticks, even having the Windows patch won't keep you safe. You need anti-virus software for that."

Method

According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.

It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.

Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.

Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.

But Conficker does things differently.

start_quote_rb.gif  Right now, we're seeing hundreds of thousands of [infected] unique IP addresses end_quote_rb.gif
Toni Koivunen, F-Secure

Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.

Variant

Speaking to the BBC, Kaspersky Lab's security analyst Eddy Willems said that a new strain of the worm was complicating matters.

"There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems

"The replication methods are quite good. It's using multiple mechanisms, including USB sticks, so if someone got an infection from one company and then takes his USB stick to another firm, it could infect that network too. It also downloads lots of content and creating new variants though this mechanism.

"Of course, the real problem is that people haven't patched their software," he added.

Microsoft says that the malware has infected computers in many different parts of the world, with machines in China, Brazil, Russia, and India having the highest number of victims.

Source:news.bbc.co.uk/2/hi/technology/7832652.stm

 

E-mail this post to someone or Comments here