Productive Network and System Administration

Solving Problems:

Let’s not try to hide or pretend here because solving problems is what we do for living and the first thing we need to do is acknowledge that every problem gives us an opportunity to grow and become wiser. If we don’t have this mindset then maybe we should change our profession sooner better than later.
Read more ›

WMF Security Vulnerability

Microsoft has confirmed the security vulnerability in the Windows Meta File (WMF) which can be used to install any type of malicious code to your computer (mainly Viruses and Trojans). There are many variants of exploit already appearing in the internet. Microsoft is planning to release the patch next week on 10 Jan 2006 but many security experts say that it might me too little too late.
Read more ›

Are they Fishing or Phishing online?

Many of my friends and relatives have computer and go online. Time to time they read technical news and get warnings about the security issues but like most of the users they have a hard time comprehending the jargon of geeky security terms that actually have different meanings than what they seem at first sight. I try to explain that Viruses, Worms and Trojan Horses on the net are not same as SARS, Ring Worms and Horses in the wild…
Read more ›

New Year 2006 in HK

Hong Kong looked very bright and shiny as usual for the Christmas and New Year. This is the tall Christmas tree at Santa’s Town in Central
Christmas Tree in Central

Read more ›

Is your PC secure?

Any computer user who is hooked to the Internet for a while knows that it is not a very safe place to be without self protection. I’m talking about adware sites preying for some innocent users to click on them with flashies, smilies and hotbars. Sometimes even experienced users get tricked into clicking on them. There are times when we’re just helpless because of the security holes in Operating Systems (like Windows) and browsers (specially Internet Explorer) that makes us an easy target. Hackers and crackers use these holes to implant adwares and trojans to our computers without our knowledge. There are plenty of phishing sites loaded with booby-traps and emails claiming to be from your bank asking you to provide your personal information and passwords. Email that has transformed the way we communicate today isn’t safe at all. Most of our Inboxes are always cluttered with SPAMs and Viruses during outbreaks.
Read more ›

First Post

After struggling almost for a week to find an appropriate domain name for my site I realized how difficult it is to register a name that you want. Finally I settled down with Nirlog.com (Nir=Niranjan & log=weblog) after trying many different crazy combinations. Then had to decide which blog software to use. For most of the people there are quite a lot of choices available e.g they can choose from many of the hosted services or apply for some web hosting package and install the software. But I had only one choice because I wanted to have absolutely 100% control of everything. The server, the software and the content.
Read more ›

Top