Wednesday, December 28, 2005

2005 in Reflection - [POEM]

2005 in Reflection - Journey

2005 has been a year to remember,
A lot of action and a splendid candor,
It has been a year faced without regret,
Though some events that I chose to forget.

Diabetes causes me to be lethargic,
Falling asleep while driving can be tragic,
If I want to carry on living, to see my wife,
Exercise and diet will be part of my life.

Working with friends who requires assistance,
Mentoring and guiding with little persistence,
To these good people, I am sure they could,
Succeed with greatness, they truly would.

A great event was held in late September,
A Hacking Conference, that everyone remembers,
A gathering of friends and experts, is nothing new,
I found it proud to be part of the crew.

Around the world, speakers and participants came,
Skills, capabilities none that are lame,
Memorizing tutorials can be great for action,
Short skirt and big tops can be such a distraction.

Rediscovering the Net, a new found love,
Blogging and writing as free as a dove,
Making new friends as the days go on,
Realizing new impetus, a chapter is born,

A close friend of mine told me he is sick,
Not realizing how bad, i deserve to be kick,
His news came to me as a great big shock,
The impact was great, feels like been knocked.

To my daughters, who excelled I'm truly proud,
Getting 8 As and thus removing all my doubts,
You did not get your brains from me as you now know,
Must come from your mother, it just goes to show.

Monday, December 26, 2005

Ho - Ho - Ho - Where will my diet go?

It has been a very interesting weekend to say the least. Much has been spent mainly on food (I know who would enjoy this greatly though). Since, plodding along with friends from one joint to another, I thot maybe it will be interesting to share the experience in documenting the food preparation in some of this joints.

[Soul(ed) Out]

Interesting layout. You have a selection of Open air or Aircond Dining environment. In the aircond area upstairs, you also have a choice of a family type siting area with lounge chairs and eating table with TV.

Menu selection covers the normal western, american/mexican food (nacho etc) and eastern (teriyaki chicken etc). Wine list and apperitifs and mocktails are quite nice albeit a bit on the expensive side. Waiters are fast, and service is very quick.

Food on the Western Menu side is nothing to shout about, as I have seen better Western Sets at Cable Car, Chillis and Jakes. The Salads and Terriyaki is ok and reasonably tasty but not outstanding, but better then some of the Japanese fast food outlets. The Tandoori and Kebab are quite spicy and tasty, which I think is above average. The drinks and apperitifs are interesting with nice choice. Overall, its a nice place and setting to hang out. Price - is equivalent to that of Chilis or TGIF. My choice here would be Shish Kebab, Roast Beef Salad and Chicken Terriyaki.

[Cable Car - Sunway Pyramid]

Typical Restaurant setting with booth ala Penang Cable Car. My choice would be the window side with view of the Sunway Lagoon Theme Park. Good place for family dining though, may not have setting for private dinner though.

Menu Selection covers western (which covers escargot to steak) and Local (Yong Chow fried rice and Laksa). The drink list is fairly normal if not basic, i suppose to cater for local choice. Waiters are ok and seems inexperience on some occassion. This is made up by their friendly service though.

Food on the Western side is above average, tho not as good as Jakes or Chilis but is fairly juicy and nicely done. However, I normally prefer baked potatoes with my steak which they serve here with fries. The Local dishes are done quite well and I would say that this Restaurant is a safe bet for local delicacies. Don't expect any fancy choice of drinks here. Price is worth the volume for this kind of setting. My preference here would be the T-Bone Steak, Salad and oxtail Soup.

[Aji-Don Alley - Plaza Damas]

Gerai Stalled Food Eatery with some covered eating areas with hard benched stools and outdoor styled timber table. Located near one of the hotel and on the Plaza Level, it faces the courtyard with fountains and artificial running "streams".

Menu Selection covers Western (Waffles and Steak) and Locals (Moontarbuck, Mee Dali, Kacang Pol, Kuey Teow Kerang/Udang etc). My choice here would be the Mee Dali, Kuey Teow Goreng or the Kacang Pol. The Mee Dali on Friday and Saturday has marvelous Tulang as add in.

The food here is excellent for me that is, except that becoz of the seating is limited and the place is popular , you seems to feel chased out as people keep queuing for seats and you are somehow in the rush to eat. To avoid this, I usually hang there early but the window of eating is to short. Price is reasonable and worth the investigation.

Saturday, December 24, 2005

Tis the Season to be Jolly

As I sit down sipping my Marchiato, this jingle keep ringin in my ears..
You better watch out
You better not cry
You better not pout
I'm telling you why
Santa Claus is coming to town ...........

Ahhh....the sound of HOLIDAY....

To all Netizens and Blog Owners and Readers, have yourself a Merry X'mas....

Friday, December 23, 2005

Ever Wondered when going to movies

Sometimes when watching movies, i find myself asking some stupid question. Why can't I just enjoy a movie without trying to rationalize them!!!!
  1. You know when you watch STAR WARS or STAR TREK, the star fighter travels at warp speed or faster then the speed of light and shooting of their lasers. I ofter wonder, if they are travelling faster then the speed of light, won't they reach faster then their lasers. Does that mean they are shooting at themselves?
  2. The scenes in Babylon5 or Enterprise, where you have many form of aliens, think of it, how does the architect design in the urinals and WC's for all these aliens. How does a ship that big cater for these aliens, whose needs to remove waste.
  3. I find it difficult to believe that Enterprise or the Death Star does not run on Windows or Linux OS. Where are all the blue screen and core dump screens? Why does R2D2 need to be connected physically ala serial port connection.? Don't they have Bluetooth or Wifi in the future?
  4. In the Enterprise, there is a bar. How do you differentiate which is an alien and which is not? After all, most of them will be drunk, and its very difficult to tell one from the other?
  5. When Luke Skywalker gets his hands chopped off by Darth Vader and he falls down the cavity, why does he fall in the first place, there is no gravity outside the ship, or is it there?
  6. Why is it when they use the transporter to transport from the ship to the planet, it is always a smooth process, what if there was a malfunction, do you get Captain Kirks brain in Mr Spocks body (since I suppose the molecular build of human is different from Vulcan). That is the first think that I will hack first...
  7. In Superman, does Clark Kent wear boxer shorts. If he does, how does he take a leak?
  8. When watching Matrix, when the character Neo meets Seraph, the guardian of the Oracle, was the fighting scene a challenge and response (authentication)prior to talking to the Oracle (Database)
  9. In Matrix, those bodyguard watching over the Merovingian, are those deamons or processes that cannot be killed?
  10. Why do you have many agent smith (is it becoz smith is a common name) replicating since it wants to eradicate Neo (the anomaly - virus?)

It is that time of year

It is that time of year:-
  1. When your boss calls you for your performance appraisal, and you keep wondering why are there not enough days for you to perform.
  2. When your friends go back to their kampung, leaving you writing nonsensical blogs like this
  3. When your colleagues go on a long holiday weekend while U try to figure out what to do with your life tomorrow
  4. When you start wondering whether your next year resolution is the same as before or does it matter in the first place.
  5. When your pocket gets empty due to expenditure on school books and uniform for your kids for next year.
  6. When agencies calls you up for services unbeknown to them as they need to do Christmas Shopping
  7. When there are flurry of parties and "kenduri" for you to attend, but you are on a strict diet and trying to watch your weight.
  8. When you realize that you have 40 odd days of leave for which you need to finish, but when you take it, you are still called to the office.
  9. When you have to travel out of town for a a business planning sesssion for next year for which there are absent of internet, and you need the net for planning in the first place.
  10. When all your staff seems helpful since it is time to appraise them.

Sunday, December 18, 2005

Privacy>Confidentiality>Trust - Long Post

A blogger Spoonfork (Mel) commented on one of my write-up to elaborate further on my understanding on the issues of Privacy, Confidentiality and Trust. Being a person who may not be strong in the command of the English Language, I will attempt to answer him by describing this through a thought process. Basically, how do I rationalize the relationship between Privacy, Confidentiality and Trust.

Definition in Dictionary.Com
  • Privacy is "The quality or condition of being secluded from the presence or view of others."
  • Confidentiality is " Entrusted with the confidence of another" and
  • Trust is "Firm reliance on the integrity, ability, or character of a person or thing"
Privacy (in my view) is trying to keep the view or information secluded to other and relates to a person specific or personal space, but Confidentiality covers a bigger aspect of secluding of information or entrusted confidential information relating to person or any other persons, company and/or entity. However, the common challenge in defining Privacy is that there seems to be a philosophical view of what the boundaries are and varying degree of what is deemed private and what is not.
Those familiar with Venn Diagram will know that if I were to draw two circles having overlaps, one circle represents Privacy while the other Confidentiality. In an illustration, it will go as follows :-
  • "A" tells "B" about a certain confidential information. "B" accidently disclose the information about "A" to third party. "B" is breaching a Confidentiality Agreement which has led to "A" privacy being infringed.
  • "A" tells "B" about a Confidential information about a company "X". "B" accidentally disclose the information to third party. "B" is breaching Confidentiality Agreement but has not infringed "A's" privacy.
The private/public domain of one person may not be the same of another. Here are two simple example for illustrative purposes:-
  • If a business card is pass on from person "A" to person "B". On the business card, there are contact number, email address, Company and Position. If this information is then passed on to a third party, the generally accepted principle under Common Law is that it is not infringing the privacy of "A" as the information is deemed available in Public Domain. Unless "A" explicitly spells out to "B" that the card is explicitly for "B" and not to be shared, then the action of "B" does not constitute breaching of confidentiality and "A's" privacy is not infringed.
  • "B" goes to "A's" house and visits the compound and garden and since "A" defines his personal space is his house, "A" does not find "B" as infringing his privacy. "B" goes to "C's" house, but "C" defines his personal space is the house, garden and compound and thus when "B" goes and "trespass" into "C's" garden, "B" is infringing "C's" privacy. Here, the boundaries are subjective and since unbeknown to "B", "B" can get into trouble.
Nevertheless, there still are disagreement because what is deemed private has to be explicitly made known.

Trust however, is the result of a person or entity that has been providing reliable, predictable and secure services to another over a period of time. Which is why, in the Network world, you may require technologies that build trust through the keeping of Information in a Secure Manner (Confidentiality), preserving the Integrity of the information, presented to you by and Identifiable and Authenticated Persons/Servers. This require another independent chapter on its own though ;-).

Saturday, December 17, 2005

An ASS of Me without U

Man, I sure became a laughing stock for another idiotic mistake of taking things for granted and "assume" that friends Pentium 4 means Centrino. Having collected a DELL Widescreen Pentium 4-M (Nvidia, 1.25G RAM and 40Gb HD) and having installed the Mac OSX on it, spent the last week trying to configure the Nvidia to support the wide resolution and getting the wireless to work. GREAT Intent, BAD execution.

You would have thought one of the latest DELL widescreen comes with wireless, wouldn't you.? (Now, that is a rhetorical question). No, I was trying to make the OSX to recognize the wireless card when there was none in the first place. When did I find that out?, when I was returning the notebook to the owner and profusely apologizing to him on my inability to configure his DELL wireless to work . He gave me a chagrin look and said "Well, it would have been marvelous if you could, since there was no wifi card in there at all". He and another colleage spent the whole 5 minutes laughing their heads off.

Man, was I stooooopid. I had to rationalized and console myself that at least I made both of them happy. Another of those casualties..........what can I say.

Tuesday, December 13, 2005

Supposition of a Conspiracy Theory?

After about a month of blogging, and conducting some preliminary research into this matter, while browsing to other peoples blog, I noticed that there are some interesting observations which leads me to form certain hypothesis . The ever suspicious mind that I have keeps bringing up that this could be a conspiracy theory. Let us look at what we have to consider where there could be basis to my hypothesis:

a) The theory of 6 degrees of separation between any people. These seems to be the philosophy incorporated into marketing of the "Gmail" service. Do you know, when "Google" sends you an invite, and you are suppose to invite frens to be entitled for a Gmail account, that is not only a brilliant marketing approach but also provide a sense of exclusive brand positioning. However, in doing this way or marketing, you then can link one account with another, since generally one only invites friends.

b) The provision of Blogs Hosters providing a less then ideal hosting mechanism, so that users leverages on other Service Providers to improve their blogs, thus leading to many accounts being created on many hosters which then subsequently can lead to the profiling of Bloggers and their interest and activities. Let us analyse what these services do:-
  • Tecnorati - Service that provides search of who is linking to who and indirectly provides a search engine to the blog as it tracks updates between these links. Which leads to some form of community tracking which may arise to profiling of interest within the communities. (Require Account)
  • Blogrolling - Automated Blog listing service that one subscribes to determine which of the blogs are updated and subsequently identifying the "activeness" of blogs and frequency of updates. Also can lead to rating and popularity of blogs (Require Account)
  • Flickr - Service where photograph can be hosted so that you can link to personal blogs for publishing. (Require Account)
  • Haloscan - Comment Page with value added features for bloggers to leverage to experience enhance feature sets. (Require Account)
  • Adsense - Blog Advertising, putting a name to the blog (by cheque)
Ironically, when an individual choose to host its Blog, he/she may do so anonymously and his/her privacy maintained, but as he/she interacts, this anonymosity is watered down. However, when the blogger then chooses to use other providers and creates accounts for the services, these then erodes further the confidentiality of the blogger. Individualy the dots maybe insignificant but collectively these then provides the links and all the dots can then be joined. Which leads to my hypothesis that this is now becoming one of the best profiling mechanism.

How then will the users privacy be protected?

It is even more of a concern if these database are then shared , though under different organizations, should a state of emergency be declared, these can then be used to confirm the connection and links while putting a face or a name to the so called anonymous blogger. Thought process and manner of writing can then be used to determine the bloggers state of mind and their inclinations (as evidentiary support).

Someone tell me I am wrong and too captivated in these Conspiracy Theories or just plain paranoid.

Sunday, December 11, 2005

Mood - (POEM)

Pardon for this measly attempt at another POEM

Mood................

Moods is something that can swing,
If it is not managed, it can be king,
Influencing our action, in every day,
Cramping our lives, in many way.

Some moods are bad and some are good,
Not getting excited, one maybe should,
Lest we get remembered, and truly known,
Emotions and excitement, our very own.

Changes in moods are sometimes caused,
Bad behaviour and actions, making one cross,
If we don't conquer this changes in mood,
Lashing at friends, may not be good.

Moods are also changed due to hormones,
Changes in our bodies, we are not alone,
Affecting some of us incessantly,
Exhausting and tiring, affecting emotionally,

We are often challenged by changes of mood,
Wishing that we can manage if we truly could,
Affecting us badly when we are down,
Conquering its effect, we can but frown.

Moods can be used to work out for good,
Changing ourselves, one truly should,
Influencing our moods, to positively,
Changing our minds, ever gracefully.

Saturday, December 10, 2005

Celebrate/Delibrate

My blog is a month old. I am not sure whether to celebrate or to ponder and maintain silence for it also happens to be the day before a major casualty. It is quite an irony that what started off as my experiment and excercise for me to learn about writing, has now evolved into a place where I seek solace and therapy. I find that as I write, I began to find peace and put observation, thought process and emotions to "electronic paper" .

As I write and reflect on the support given by colleagues who have been patient with me, I wish them the best and would like to give them due recognition one of these days. I owe them quite a lot, though we barter trade and services regularly, I think they deserve better to be better compensated.

I am also new to this new media and its trust and recognition model. I also find it intriguing that though there are some parellism in life, there are also ironic differences. This new media can sometimes be, not forgiving with mistakes as indirect documentation becomes part of life. As I troll the Net and "Google" my name, it is very scary to find pictorial and documentary evidence of my postings and presentations done as far back as 1994. I also find it uncomfortable having to see photographs of me in the "younger" days.

Ironically the manner, character and mode of posting for me seems consistent (I think) when its in the newsgroup or the web. Friends remarked that my response and comments are sometimes to stolid, formal and "needs to loosen up". Guys, I am trying!!.

Anyway,"Let us move forward to our new Ventures", I thought to myself.

Thursday, December 08, 2005

Songs of Christmas (Carol)

I was sitting down as usual in my normal Coffee establishment at the Straights and hearing this Christmas Carol and was wondering, maybe I should sing to Christmas Carol my way and with my wordings. Well, here goes and early attempt :-

Twelve day of Hacking Course (sung to the Twelve day of Christmas)

On the first day of Hacking Course
My tutor gave to me
A program from a script kiddie,

(second day) Two scanner programs
(third day) Three Backdoor Tools
(forth day) Four Wifi sniffers
(fifth day) Five War Dialers
(sixth day) Six Tools for Phishing
(seventh day) Seven Phone Phreakers
(eighth day) Eight Trojan codes
(nineth day) Nine Password Crackers
(tenth day) Ten Tools for Spoofing
(eleventh day) Eleven Lines of Codes
(twelve day) Twelve List of Hacksites


I am dreaming of a White Notebook (sung to White Christmas)

I am dreaming of a White Notebook
Just like the ones I had just broke,
Where the screen are vivid,
And the background are livid,
Just like the colour of the snow.

I am dreaming of a White Notebook
With every visit that I see,
May your hands go shaky,
And your budget go flaky,
Until you had it packed for me.

Wednesday, December 07, 2005

Romancing the Net

I was looking back at my involvement with the internet, and to think I have been toying with it close to 13 years scares the life of me. There is a reason why I am relooking at this "history".

My first acquintance when trying to connect to the internet was ironically was through the setting up of a Bulleting Board service using a software called Remote Access. However, when JARING came to town, my colleage and I went to Exchange Square to queue up to get our own account JARING account. We were advised to bring along a few diskette to copy a programme called SNUUPM and SLIP packet driver. Met this lady by the name of Sham who also helped us choose from a thick (like 4 inches) of listing of newsgroups for us to get support.

A few month later, got updates from this gentlemen called MAL (didn't know who he was at that time) that there is this new up and coming services called web/http. Telling us that new thingy was going to revolutionlize the Net, trying to explain that it was an evolution of this technology called Gopher. Said that if we want to try it out, we need to come and collect a software called Mosaic. Well, we know what Mosaic turn out to be and how the Net went on like wildfire. That was the year 1994.

At the same time, I was dabling with something that got my eye at the time called Linux. I remember that the kernel at the time was 1.0.9. Was trying to fiddle around with this software and boy, did I find it very useful. Didn't know how great an impact it soon become, until recently when I was rummaging through the my files and found some configuration files to configure uucp, innd, fwtk and a"patchy" server. In fact I managed to save one organization RM25k at the time with this rudimentary server running DNS, Web, Mail and News.

The reason I was reminiscing, was that I was trying to do some research on the time lag on the realization and introduction of application with respect to the introduction of technologies. I came across the fact that applications like the light bulb,water heater and oven came about many years later after the introduction of electricity, in fact 30 years to be exact for the first application to be introduced. Now with the Internet, what is that lag time like? Is it 3 years, 5 years or much later. Seems that the lag time is different for different countries.

So, is this lag time also an indicative of the social development and/or assimilation level of knowledge in the country, one wonders ;-)?

Monday, December 05, 2005

Reward for Impact Creation....

I remember one wise man in one of the company that I used to work said to me " Always pay your hardworking employee soonest possible for a job well done even before their sweat has dried". That way, they will remember you for a long time. He went on to advise me "Look out for talent, if they create impact for the company, we should reward them well". "I think we spent more money in advertising and customer care just to get a certain brand image".

This provocative thought came about as I was reading the news on Nicol David. Here is a lass, who was written of by some sports pundits years ago for being not good enough and have burnted out and lacks potential. Now, she has demonstrated that not only does she prove all of them wrong and she is on top of the world and she has the mettaled to be the youngest woman world squash champion.

The next question in my mind is, does the people of her country recognize and appreciate these efforts and position that she has brought Malaysia to? Or is she going to be laid by the wayside like the Karamjit and the two Mount Everest Climbers. I feel that she deserves all the assistance and support required for her future endaevour (not that she needs a datukship).

We talk a lot about knowledge economy and how people are our assets. Here is one lass that has brought impact and placed Malaysia in the limelight, and yet we have not gone ahead to make her a national hero. What does she have to do? Isn't she a national asset? How do we treat assets?

Scarred Tissue, [Poem]

It is difficult to know what is in my heart,
When its shreded,ripped and torn apart,
Threading carefully, it needs to be
To mend its scar ever so carefully.

Women handle it quite differently,
Rationalizing their mind repeatedly,
Testing questions they seem to send,
Cryptic answers, we don't understand.

With normal macho, is man's approach,
Never heed advice nor need to be coach,
Though deep inside, they seem to be,
Confused and perplex, suffering silently,

Following our heart we sometime do,
But not our mind which is more true,
Regretting some actions between the two,
Not giving enough time, to think it through

Do we understand our partners heart,
Suspicion and stress draws us apart,
With each attempt, we sometimes cry,
Overcoming failures, we have to try.

Learning to say that I am sorry,
Making your partner feel less worry,
Keeping ones silence, is very deafening,
Demonstrating ones care, can be promising.

How do we mend these heart of ours,
Is it just time, but how many hours,
So that maybe we don't fall from grace,
Maybe what is needed is also space.

Some wise man says, we need reminded,
Forgive and forget, lets make it a standard,
Take many deep breath before we do,
When anger erupts between the two.

What is important , we need to decide,
We have to take note, relationship or pride,
To choose each path there are its merit,
Each has consequence, when executing it.

But in the end, what matters most,
Will we be together, like two nice host,
Gaining experience as we grow old,
Reviewing our actions lest we get cold.

So what can be learnt from all this reasons,
With every each word there is a lesson,
To learn that taking and giving is part of life,
Accepting challenges, as man and wife.

Sunday, December 04, 2005

Selling my Soul to Coffee Company

Life has a habit of turning back on us and biting us in the ass if we takes things for granted. Today marks one of the most traumatic day of my working life. I have participated in the most despicable of act and have sold my soul to (off all thing), a coffee establishment. This moment of weakness happened this afternoon and I am now still in disbelief of what I have done and I am now trying to figure out how to console myself .

To top it all, what was originally intended as a cheeky conversation between my colleague and me turned into a nitemare when the target of cheeky conversation, a chic girl of beautiful proportion came around and confronted the two of us (my colleague and me) as if knowing that we were complimenting her. God works in mysterious ways.

Scene: A packed famous coffee establishment, time - afternoon, me and my colleage - chatting to each other using Yahoo Messenger.
Chic Girl : Are U two guys together?
Me: (Thinking - "Is this girl for real? What does she mean by that question? Is it a trick question?)...Uhh...
My Colleague : Yeah, we are working together on a project, if that is what you mean (while smiling wryly)
Chic Girl : Would you two mind being on our establishment video, to celebrate our 7th year anniversary
My Colleague : Yeah, we don't mind, we are cool
Me : (YM him frantically - Are you insane?, What do you mean by volunteering us)
Chic Girl : OK, I'll give you 10 minutes to get ready, we'll get the cameraman here shortly. (She leaves)
Me : Hey...what the hell are we going to say? Are you nuts...i screamed?
My Collegue: Don't worry, I think you are experience enough, Let me contemplate whether I should participate or not. (he smiled in hesitation)
Me : Hey, this is your doing, you are not getting away scott free. (I panic, while trying to do a verbal arm twist)

Anyway, video shot were taken, interviews were done and and we were compensated with free beverage leaving us not only feeling cheap but traumatized (at least for me). Lesson of the day, NEVER EVER attempt to oogle a bypassing girl and gossiping in Yahoo Messenger again. It could come to haunt you back in the same lifetime if not the same day. This has been a horrendous Casualty Affecting my Life. I dread to see the outcome of the video......WAHHHH!!!

Saturday, December 03, 2005

12th Planet - Worth a read??

Zechariah Sitchin seems to hypothesis that there was advance life in the Universe and this advance life forms has visited us many thousand of years ago. He also postulated that these advance lifeform are the ones that has "intervened" the normal evolution and and using the base humanoid at that time created "man" in the image of themselves to be slaves. These advance life form was implied to have come from the realms of the 12th Planet.

Ironically the date of the book predates the recent discovery of what seems to be the 12th planet in our solar system. Sitchin based his hypothesis on Babylonian and Sumerian historical records which is somewhere in the region of 2500 to 4000 BC. Sitchin also tried to reinforce his argument with certain assertions that the recorded storyline of the Babylonian and Sumerian records are very much similar to that of the religous scriptures both in events and stories recorded.

Though I find the book to be a bit long winded in its approach and argument put forth, the latter chapters are interesting in its attempt to decipher and translate Babylonian and Sumerian language to the common historical events documented in the scriptures. The argument seems plausable and reasonably convincing to bring the reader to think that the explaination put forth could be the missing link. This argument if true may reconcile the differences between the darwinian theory of evolution and the holy scriptures of the world. It is this premise that I think Sitchin is trying interject and base his theory on.

A good read, albeit there is lots of details to comprehend and arguments to follow and linked.

Fresher Outlook

Traffic Jams in KL has become so unbearable nowadays that it now becomes a hindrance for you to enjoy travelling from one place to another. With PC Fair and Batik Convention, the Golden Triangle has become a hell of a challenge to just pass through. What use to take 30 minutes now take 90 minutes just to get through. Its almost a car park.

60 minutes of oblivion makes you do and think of many ridiculous subject from assessment of passer-by to self critic. On the positive side, I took the time to carry our a self assessment of myself for the month. Character wise, being an an experience (read above middle age) person and passive in nature, I can sometime be over bearing in nature and unknowingly may impose myself on other people. Many of my friends tend to be obliging when I do call on them. Only question is, am I too imposing when I give them a call?. What is the balance between calling them and them feeling compelled to follow your plan and you not calling them and them finding out you are in the neighbourhood and you have not informed them, they cud be ok with your company?.

Where is the borderline between being intrusive and being a non-concern friend.? After recent experience, I now find myself hessitant on making these call lest being labelled intrusive or worst still harassing. Quite an interesting predicament that I got myself into, maybe this will turn me from a collaborative type person to a loner type and be more focus on my task, who knows?

Thursday, December 01, 2005

Should we all be NICER? [POEM]

Browsing to a fellow blogger website, and sharing his displeasure of many self claimed experts, i thot maybe i shud remind my friends and I as to the perils of being a Security Consultants (not that I am). Here is my feeble attempt at a poem:-

Ode to Security Specialist

There was once a security analyst,
Whose job was based on best practice,
Tried to hack into a computer host,
Failed in attempt hence he cannot boast

He then saw opputunity and went into teaching,
So that he can carry on live long preaching,
Talking and dreaming are his ability,
Not a great contributor to the society

Believing himself to be the greatest,
Arming himself with the latest,
Notebooks, knowledge and a U degree,
Adding to his title a CISSP.

Showing it off, work as a consultant,
Don't understand the detail, also reluctant.
Bullshiting his way through and through,
Getting admirers in everything he do.

Carrying out pen test he tries to do,
Its not something done in the loo,
Outsource to a team done remotely,
Giving client impression that it was easy.

Conducting a class on security Audit,
Attendees went back not comprehending it,
Content provided was a great big crap,
Souvenir was great, got a big cap.

Security is not acquired just by learning,
It has to be reinforced by also doing.
Understanding details is also good,
Managing controls, one truly should.

Inbuilt Security into design rigourously,
Managing all the processes, continously,
Looking for vulnerabilities is what we do,
Conduct system patch, let me remind U.

Security is not something that U can talk,
Just from your ass, go take a walk.
To all you good people make sure you do
Research and study to live it through,