Social network

On 21st April 2018, a local NGO, Anak IT, organised a workshop called “Cyber Security Workshop (I) – Cryptography” at the offices of Techone Global at K-Hub, Anggerek Desa.

The objectives for this workshop were to have the basic understanding of cryptography and the different types of cryptography such as encoding, encryption, hashing and obfuscation. The speaker was Mohd Zulfadly Haji Ismail (founder of Anak IT).

The workshop was attended by 30 participants comprised of UTB, IGS, Politeknik, LCB and several private companies. The workshop started with opening speech by Mohd Zulfadly Haji Ismail (founder of Anak IT) to brief what Anak IT is all about and followed by safety briefing by the representative from TechOne Global.

The participants were taught the basic knowledge of cryptography which is categorized into 4, consisting of encoding, encryption, hashing and obfuscation.

On encoding, it was commonly used to transform data that can be properly consumed by any type of system. Examples of encoding are Base64, URL encoding, etc. On Encryption, participants were taught the difference between encoding and encryption. Where the difference is the goal of encryption is to ensure the data cannot be consumed by anyone other than the intended recipient. Examples of encryption are AES, 3DES, DES, etc. Meanwhile, for hashing, participants were taught that hashing is to take any input and produce a fixed-length string and it is a one way encryption. On obfuscation, participants were taught that it doesn’t securely hidden the source code but rather to add obstacle to the source code.

After the sharing session by the speaker on cryptography, the participants were given basic challenges on the subject intended.

To conclude the workshop, majority of the participants have acquired the basic understanding on cryptography which could benefit them for the upcoming capture the flag.

The workshop is supported by TechOne Global, ITPSS and BruCert.

Online Scams and how to deal with them

6 July 2015

Online Scams A scam is a way of cheating people intentionally without having to obtain someone’s personal details. Instead, it is the victim who usually gives away their personal information to the scammer. Here are some examples of scam: A common scam these days is when you receive a text message from an unknown number […]

Read the full article →

Be a smart online shopper

2 July 2015

Online shopping is a popular trend of buying products or services through the internet. The wide range of choices available online make it very attractive and convenient to shop from the comfort of your home. Are there any risks that people should be aware of? There are quite a lot of risks when shopping online, […]

Read the full article →

Collaborative Consumption – Infographic

22 June 2015

A sharing economy takes a variety of forms, often leveraging information technology to empower individuals, corporations, non-profits and government with information that enables distribution, sharing and reuse of excess capacity in goods and services. A common premise is that when information about goods is shared (typically via an online marketplace), the value of those goods […]

Read the full article →

Why People Unfollow on Social Media [Infographic]

12 March 2015

Fractl and Buzzstream surveyed 900 social media users to find out why users unfollow, and what behaviors companies should avoid. Earned media and customer engagement are two of the primary uses of social media for business, but why do people unfollow or unsubscribe? Source: See on – Aspiring Outliers

Read the full article →

How much is twitter worth (to small businesses)?

10 November 2013

See on – Aspiring Outliers Today the third major social network is becoming a public company. As with all major IPO’s, we will read a lot of diverse and conflicting opinions on its valuation: to some Twitter will be an overpriced money-losing startup, to others it will be the next major player of the […]

Read the full article →

Where Social Media Use is Growing the Most (Infographic)

18 October 2013

See on – Aspiring Outliers Every year, in every continent around the globe, more people are using social media to interact. Nearly 1 in 4 people in the world now use social networks. By 2016, eMarketer predicts that 2.55 billion people worldwide will use social networks. Top areas of growth? India, Indonesia, Mexico, China […]

Read the full article →

9 Tips For Keeping Your Internet Use Private

19 August 2013

See on – Aspiring Outliers Many people are concerned about online privacy. And, conversely, many more are not, freely sharing any and everything on their favorite social networks, paying little attention to their mobile app settings, and happily letting Google track each keyword that they search. It’s easy to get paranoid about all this […]

Read the full article →

How To Create A Perfect Tweet [INFOGRAPHIC]

25 July 2013

See on – Aspiring Outliers Much has been written about how to write the perfect tweet, from what link shortener to use to how many characters to leave room for retweets. Now the folks at Neomobile have tried their hand at creating a guide to composing the perfect tweet. See on

Read the full article →