Category Archives: Miscellaneous

Default category

Riding The Cloud of Multi-million Worth of Infrastructure

Do you still remember the OLPC (One Laptop for Child) program and other (if any) with similar purpose? Let me help you lessen the time for googling by citing the mission of this program from its official cite, “To create educational opportunities for the world’s poorest children by providing each child with a rugged, low-cost, low-power, connected laptop with content and software designed for collaborative, joyful, self-empowered learning.”  From a recipient’s point of view, what could this be? The meanings and implications may differ however one thing for sure, the recipient -given the condition he/she can’t afford laptop at normal price- is given luxury at very affordable price, the luxury of owning the gate to access the advancement of technology.

Similar story now may be repeated in the near future in computation area. It’s less than decade from year 2000 but if we compare the computing power of a node (e.g.: standalone PC, server, workstation) in that year with today’s, the discrepancy is very significant. In less than a decade we have seen how computers are becoming faster and how hardware prices are becoming cheaper. These days, multi core processors are becoming more common thus multiplying the computation speed of those of single core.

Continue reading

A New Toy Namely Google App Engine Has Arrived

Google seems to love and hate me at the same time. Some moments ago (I forgot the date I filled the application), I submitted application form for testing its App Engine. I was just curious about its cloud computing environment and wondered if the infrastructure they built could properly address some issues common in grid computing or cloud computing architecture. Also, I thought it would also be nice for me, although I’m not exposed to the details of the architectural implementation, to use their infrastructure for research purpose as I’m currently researching on distributed systems.

I received an email from Google containing the approval of my application. No need to explicitly express how radiant I was to receive such notification because it really means something, to be frank. The caveat is, current SDK provided only supports Python programming language, a language I am not so familiar with. I have never spent hefty amount of dedicated time learning Python, to get to know what’s inside and out. Lacking the knowledge can be a taxing obstacle, but let’s just see if I am up to the challenge.

Later, I will provide an article about cloud computing for those who want to know why it’s often said as a promising architecture for future web computation.

In the meantime, if you have ideas about applications to build or good references for Python, just let me know. The comment section is open 😉

Statistical Data of Year 2008 for This Blog and Plan for 2009

It’s been two years since I managed to write my concerns, opinions, and thoughts about technology-related topics in my own blog, which is this blog. Although the blog was originally intended to be supplementary since it’s not the main part of my future plan, it has evolved to be the façade, main terrace of a partly unveiled palazzo.

It has captured its own audience, visitors coming mainly from search engine results page using several keywords. This is mainly because I exerted minimum marketing and public relation in order to analyze how prospective the blog itself if it only relies on third party marketing, hence search engine crawl results and people discussing one of my posts and then put a link to the original content. Efforts put to expose this blog to broader audience may seem to be minimal. By seeing traffic statistics during year 2008, however, the trend infers positive outlook, a signal for me as the blog author to keep posting quality posts containing valuable information for people who might need it, avid tech blog readers, or just random visitors happen to drop by. Continue reading

Awaiting More Stable 2009 After 2008 Roller Coaster

It’s the end of this year and I think it will be worth noting some important events in this year that have brought memorable, shaking, crucial, or unimaginable experiences and impact wordwide. This year has been a year of ups and downs, a year that invalidates prediction and forecast by top firms and analysts.

I noted two most important milestones in this year that contributed significant triggers to current downturn and. To mention the first, it was the exploded subprime mortgage crisis that dragged some giant financial institutions to bankruptcy and some other facing difficulties in their liquidity. There are chains of reactions happened there and as the final results we can see the global economic slowdown, sluggish growth, and negative outlook which are contrary to what was expected in the beginning of 2008.

The oil price also made its record this year. It went to record high in the middle of 2008 before deeply plunging in the last quarter. During the price surge, oil exporting countries might get super benefit from the soaring price. However, as some economists advised, irrational oil price may harm the industry and bring trickle down impact to larger size. It’s logically explainable that higher oil price also means adjustment in product price. If it goes beyond tolerable market price, purchasing power will decrease which literally hints oversupply and less purchase. Consequently, industries will start facing throttled revenue and are prone to losses. Losses are easily transformed into mass layoffs, a situation that brings employees who are also consumers into jeopardy.  Meanwhile, less consumption from overall consumers is interpreted as deceleration in economic growth, a situation which is always avoided by a sovereign country.

When soaring oil price met subprime crisis bubble, the burst sprinkled distributed, globalwide recession as we see today. The final quarter of 2008 was hard time, not only for trade or wholesale companies but also IT companies. A company as big as Google, for example, had to layoff its contractors to reduce expenses. More similar stories exist but I won’t go into details here.

And now, 2009 is waiting. What story will it be? I hope optimism and positive trend will find the way to triumph over current doom. Otherwise, I might later have this blog turned into a  wall of sorrow.

TDSS Trojan and Bediddle Adware – Hindsight Removal Guide

Last week, my indiscreet non-techie colleague encountered his yet-another-virus-attack experience. There should be nothing big as he had an antivirus product installed. However, after casually spending his routines for some days; beverages and snacks and tons of unproductive applications running from his laptop, he felt that his laptop became much slower than usual and also exercised some strange behaviors. He later asked me to investigate the oddities and construe what was actually going on.

To my surprise, normal simple procedure in detecting and destroying virus, trojan, and other malware didn’t work at the time. Antivirus reported nothing but the strange behaviors persisted. Still being unsatisfied and puzzled, i tried to verify antivirus’ finding by conducting online scanning and here the mystery started to unravel.

To make it short, my friend’s laptop was infected with TDSS rootkit. This rootkit is a combination of trojan and adware. Reported first time by Sophos, this attack has gained its notoriety as one of the hot trojan and malware attacks in November.

If you happen to experience symptoms below, you might infer that you have been infected by TDSS rootkit:

  • Slow browser
    Your browser unusually loads slower than it should be. Even though browser is the only application you run, the speed is still slow, invalidating assumption that the slow loading is caused by insufficient memory
  • Continuous high CPU percentage for System Idle Process
    If you press Ctrl-Alt-Del and see the list of running processes, you will notice that “System Idle Process” consumes most of the CPU cycles, usually more than 90%
  • Denied access to some files and folders
    If you enable System Restore, you will notice that if you click the folder “System Volume Information” that resides in the root directory of each drive, you will get message “Access is Denied”. You can also check some other files in system32 folder and raise the same message.
  • Redirection of results from search engine and unavailability to access antivirus and security websites
    If you try to search for remedy for the infection and type words related to antivirus like “virus removal, trojan removal, TDSS, antivirus vendors, etc” you will notice that every time you click the link from the result page you will be redirected to another search engine, that is bediddle (bediddle.com) or some other page that is different from the real link.
    You are also disabled from accessing antivirus providers’ websites and circumvented from conducting online scan.
  • Antivirus doesn’t work or only seems to work
    If you try to scan using your antivirus, it will say your system is safe. This is actually not true. Try updating your virus database definition and you will see error reported by the update engine. Also, if you want to install a new renowned antivirus, you will always fail the installation.

Continue reading