Thursday, July 5, 2018

WiFi Alliance introduced WiFi Certified WPA3 to replace current WPA2 security standard

WiFi Alliance has just introduced WiFi CERTIFIED WPA3 (Wi-Fi Protected Access version 3) as the next generation WiFi security standard, bringing new capabilities to enhance WiFi protections in both personal and enterprise wireless networks.


Key capabilities of WPA3 include:
  • WPA3-Personal: more resilient, password-based authentication even when users choose passwords that is simple to remember. WPA3 will leverage on Simultaneous Authentication of Equals (SAE), which is a secure key establishment protocol between devices, to provide stronger protections for users against password guessing attempts by third parties.
  • WPA3-Enterprise: offers the equivalent of 192-bit cryptographic strength, providing additional protections for networks transmitting sensitive data, such as government or finance. The 192-bit security suite ensures a consistent combination of cryptographic tools are deployed across WPA3 networks.
With the evolution of WiFi security from current WPA2 to WPA3, we can expect:
  • WiFi password to be a lot more difficult to crack.
  • WiFi CERTIFIED Easy Connect - IoT devices can connect to WiFi network more easily.
  • WiFi data sniffed and recorded without knowing your password will not be able to decrypt even if your password is obtained later.
  • WiFi CERTIFIED Enhanced Open - communication in open connection (WiFi connection without the need of any password) will also be encrypted, therefore much more secured than WPA2 open connection. In current WPA2, if the WiFi is connected using open connection without the need of password, the communication between the WiFi connected device and access point is not encrypted.
  • Stronger WiFi encryption by replacing the existing PSK (Pre-Shared Key) system in WPA2 with the new SAE system.
Anyhow, in order to enjoy the benefits of using WiFi WPA3, both the access point (or wireless router) and the connecting device must support this new WiFi security standard. Devices that support WPA3 will probably hitting the market from year 2019 onwards and gradually replacing the existing which only support up to WPA2.



Friday, June 29, 2018

My Dell DA300 6-in-1 USB-C mobile adapter

My Dell Inspiron 5370 laptop has limited output ports as a trade-off for its slim and lightweight design. It only has 1 USB 3.1 Gen 1 (Type-C) port with Power Delivery/DisplayPort, 1 HDMI 1.4b port and 1 combo audio port.

This means that it can only connect to the network using WiFi connection, as there is no Ethernet port. It is also not able to output its display to projector using VGA connector unless making use of an adapter to convert its HDMI output to VGA.

Luckily, Dell has made available a DA300 6-in-1 USB-C mobile adapter which is able to convert the USB-C port of the laptop into:

  • HDMI 2.0 port that supports 4K display output
  • DisplayPort (DP) 1.4 that supports 4K display output
  • VGA port that supports 1080p full HD display output
  • Ethernet network port that supports MAC address pass-through, PXE Boot, and Wake-On-LAN
  • USB-A port with up to 10 Gbps data transfer speed
  • USB-C port with up to 10 Gbps data transfer speed

This Dell DA300 mobile adapter is plug-and-play on supported Windows 10 computer. It can be used straightaway without the need to install any driver.

It offers seamless video, network, and data connectivity, in a neat, compact design. It price of around RM300 is quite reasonable for its 6-in-1 functions and its innovative design.

Wednesday, June 27, 2018

About the Cyber Kill Chain

The Cyber Kill Chain introduced by Lockheed Martin is a cybersecurity model to describe, in general, how a computer intrusion (hacking) through IT network is carried out in 7 distinguished stages. It was developed based on military attack kind of thought.

Anyhow, there is no common SOP in cyber-attack, and hackers are not necessary following the Cyber Kill Chain of planning and action in their attacks.

This model is however useful to plan for cyber-defense strategy and measure, and also for cyber-threat analysis to a networked computer system.

The 7 stages in Cyber Kill Chain are:

  • Reconnaissance - the victim is observed, analyzed and studied by the attacker.
  • Weaponization - tools are developed or obtained to exploit the weaknesses found in the victim.
  • Delivery - the "weapon" is deployed to the targeted victim.
  • Exploitation - once the "weapon" is successfully deployed, it will start working by looking for vulnerabilities in the victim's computer system.
  • Installation - at the stage, access is silently obtained by the "weapon". It will find it way to communicate to the attacker using the computer network. Normally, a backdoor is established to enable such linkage.
  • Command and Control - remote access to the victim's computer system is made available to the attacker. The attacker can take over control of the compromized system and issue command to it.
  • Actions on Objectives - with the control, the attacker is able to proceed with the objectives of the attack, such as data exfiltration, data destruction, data encryption for ransom, etc.



With reference to this model, the defending party can plan for countering the attack by the famous 4 Fs strategy, namely:
  • Find the enemy
  • Fix the enemy
  • Fight the enemy
  • Finish the enemy

Thursday, June 21, 2018

Cryptography - the essential technique in today computing world

Cryptography is the method of converting plaintext information into non human-readable form called ciphertext through a process called encryption, and reverse process to convert the ciphertext back to original form called decryption.

Today, knowledge in cryptography is crucial for every computer programmers and computer engineers. It is applied in everywhere in the cyberspace and it is a sin of omission if not applied properly to provide cybersecurity protection in the areas of confidentiality, integrity, authentication, and non-repudiation.

Cryptography is the integral part of blockchains and crypto-currencies such as Bitcoin, Ethereum, etc. It is used to secure data transmission in WiFi communication, 4G LTE network, HTTPS web access, etc. It is also extensively used to secure file system in Apple iOS, Windows Bitlocker, SSD encryption, etc. It enables the implementation of digital signature.

Cryptography makes use of digital key(s) to perform the encryption and decryption process. There is one kind of cryptography called hashing which does not make use of any key, and the ciphertext is non-reversible to original information.


Keyless Cryptography (Hashing)
Hashing is a one way function that convert its input message into irreversible string of text called hash or digest, which normally has a length much shorter than the input message. The key concept of hashing is that the generated digest is unique to the input message, so that same input message will always generate the same digest, and different input message will not generate the same digest.

Hashing is commonly used:
  • To store password for identity authentication
  • To generate checksum or fingerprint to verify if the original information has not been tampered or changed
  • In database and data storage for more efficient data searching
  • In computer geometrics and computer graphics

Examples of hashing function are:
  • MD5 (Message Digest 5) - designed to replace earlier version of MD2 and MD4. Still commonly used despite MD6 has been around to replace it.
  • SHA-3 (Secure Hash Algorithm 3) - winner of the NIST hash function competition.  Commonly used in digital certificates. Supersedes earlier version of SHA-0, SHA-1 and SHA-2.
  • BLAKE2 - Used in RAR compressed file checksum. Supersedes earlier version of BLAKE.


Symmetric Key Cryptography (Private Key Cryptography)
The same private key is used for message encryption and decryption.

It is commonly used in secured data transmission, such as SSH, WiFi with password, 4G LTE communication, etc.

Examples of symmetric key cryptography are:
  • DES (Data Encryption Standard) - designed by IBM in 1970's. Modern supercomputer is able to decrypt DES encrypted information within just a few days. Still commonly used in smart cards, SIM cards, etc.
  • 3DES (Triple DES) - more secure version of DES.
  • IDEA (International Data Encryption Algorithm) - commonly used in Pretty Good Privacy (PGP) email signing and secured email transfer.
  • ThreeFish - is the successor of Blowfish and TwoFish. Commonly used in SSH secured remote access.
  • RC6 (Rivest cipher 6) - designed by RSA Security, patent just expired in 2017. Commonly used for secured data transmission and in bank ATM machines. Is the successor of RC2, RC4, RC5.
  • AES (Advanced Encryption Standard) - commonly used by USA government and commercial sector to protect top secret documents.

Asymmetric Key Cryptography (Public Key Cryptography)
Consists of a key pair. The private key that should be kept secret with the owner, and the public key that needs to be known by others.

In the scenario of digital signing, the private key is used to sign the digital document, and the public key is used to verify the digital signature.

In the scenario of data encryption, the public key is used to encrypt the document to be sent to the private key owner, and the encrypted document can only be decrypted using the corresponding private key.

It is commonly used in Secure Socket Layer (SSL), Transport Layer Security (TLS), S/MIME, digital signature, blockchains and crypto-currencies.

Examples of asymmetric key cryptography are:
  • RSA (Rivest-Shamir-Adleman) - named after its 3 designers. Patent expired in 2000. Compared with DSA, it is slower in digital signing and faster in verification.
  • DSA (Digital Signature Algorithm) - patented but can be used royalty free. Commonly used in SSH and digital signature. Compared with RSA, it is faster in digital signing and slower in verification.
  • ECC (Elliptic Curve Cryptography) - derived from DSA and based on Elliptic Curves theory. Commonly used in Bitcoin, Ethereum, iOS, etc.
  • Diffie-Hellman - is used for public key exchange and not for digital signing or data encryption.

Tuesday, June 12, 2018

Is your organization still following the outdated password policy?

If you were told or forced to set up a so-called "strong password" which required to be determined as complex (must consist of combination of uppercase letters, lowercase letters, numbers, special characters, and so on...) just to safeguard your user account from password guessing, peeping, and/or brute-force attack, the policy is outdated and should be obsoleted as soon as possible.

If you were also told or forced to change your password periodically, let's say every month or so, that thinking also has been admitted by certain cybersecurity experts to be foolish and will not make your account more secured.

Indeed, it only serves to make your life more difficult, and makes your account much more vulnerable if you eventually did either one of the following attempts to help remembering your latest password:

  • Write your latest password on Post-It notes or inside your diary book.
  • Tape your password somewhere near your computer (similar way to what character Nolan Sorrento in movie Ready Player One did).
  • Keep your password in a computer file (text, Word, Excel, ...), either password protected or not.
  • Store it with your web browser's auto-complete feature.
Apparently, the outdated password policy that required complex password and frequent change was derived from a 2003 National Institute of Standards and Technology (NIST) report namely "NIST Special Publication 800-63. Appendix A."

Interestingly, it is also NIST who has overthrown its own password guidelines in its recent NIST Special Publication 800-63A report namely "Digital Identity Guidelines:  Enrollment and Identity Proofing Requirements." released in June 2017. You can download the complete report here for free.

The new report has made the following important suggestions:
  • Verifier SHOULD NOT impose annoying password complexity rules. They make passwords harder to remember. They increase errors because artificially complex passwords are harder to type in. They make most people remembering password by Post-It notes or computer file. It's better to allow people to use pass phrases.
  • Verifier SHOULD NOT bother user with password expiration. That was an old idea for an old way we used computers. Only force a password change when there's indication of compromise.
  • SHOULD use dual factor authentication (2FA). This is the proven to be the more robust and secure way.
Dual factor authentication adds an additional layer of security by requiring not only the password, but also another piece of information that only the account holder has or know. One of the most commonly used method for dual factor authentication is one-time-password (OTP) which could be  event-based (OTP is generated by triggering an event, such as a keypress, explained in RFC 4226) and/or time-based (OTP will keep on changing by time, explained in RFC 6238).

The account holder need to read the OTP from a token, and use it for successful account login. The token can be generated from a hardware device such as key fob, display card, USB authentication key, OCRA keypad, etc. It can also be generated and delivered to the account holder by software, in the form of SMS, email, mobile app display, push app notification, etc.

Note that the use of SMS or email for OTP is also outdated method which is vulnerable to trojan horse interceptions and/or malicious software crack-in. You can search the Internet for the following keywords to read more about how insecure to use SMS for OTP:
  • ZeuS-in-the-Mobile (ZitMo)
  • SpyEye-in-the-Mobile (SPITMO)
  • Android.Bankosy
Besides, the OTP in SMS and email is very likely to be sent in plain text form, which subject to ISMS threats of interruption, interception, modification and fabrication along its way.

Therefore, all organizations should update their password policy for all users to be:
  • Use pass phrases instead of password
  • Use dual factor authentication with secure token (avoid using the outdated SMS or email method)

Sunday, April 22, 2018

Google Chrome and Firefox will distrust websites with SSL/TLS certificate issued by Symantec / Verisign / Thawte / GeoTrust / RapidSSL

Web browsers Google Chrome (with 57.69% global market share as of March 2018) and Firebox (with 5.4% global market share as of March 2018) will start to distrust all the websites with SSL/TLS certificate issued by Symantec, Verisign, Thawte, GeoTrust and RapidSSL.

This means that soon in the near future, every time when you visit such websites using HTTPS protocol with Google Chrome, Firebox and possibly other web browsers which follow suit, the browser will give you a security warning before you can read their webpage.

Some of the affected popular websites including (but not limited to)...

 



In late 2017, DigiCert has acquired Symantec's Website Security and related PKI solutions which was the Certificate Authority for those affected Symantec, Verisign, Thawte, GeoTrust and RapidSSL SSL/TLS certificates.

Webmasters of all the affected websites can make arrangement with DigiCert to replace their SSL/TLS certificates with a new one issued by DigiCert, which is still trusted by Google Chrome and Firefox.

You can click here to read for more information about this issue.

Tuesday, April 17, 2018

How to enable using F8 during boot up to enter safe mode in Windows 10

Seasoned MS Windows users are very likely to have experience using F8 during computer boot up to enter into "safe mode" of the Windows operating system.

In many occasions, "safe mode" can save your day to enable you to fix something that is broken in the Windows system. Such occasions including but not limited to:

  • Windows update has caused problem and instability to the system. 
  • Problematic hardware device driver (normally arises after new driver update). 
  • Incompatible screen resolution with the monitor causing blank screen or distorted display.
  • Windows is infected by virus or malware that unable to be removed in "normal" mode.
  • Problematic software/application that causes system crash (and unfortunately it autorun during Windows start up)
  • Minor damage to Windows registry or system file due to improper power off.
You can keep on pressing the F8 key on your keyboard during boot up of Windows 7 to enter a boot up menu that include the "safe mode" boot up option. However, this F8 function is disabled by default in Windows 8 and Windows 10.

You can still reboot Windows into "safe mode" if you are able to boot into the login screen of Windows 8/10 and the login screen is still functioning properly. You just need to hold down the Shift key on your keyboard while clicking on the Power icon in the login screen and select the Restart option to reboot your computer.

You can also create a bootable Windows recovery USB drive that can be used to fix Windows problem.

If you want to enable using F8 during boot up to enter safe mode in Windows 8/10 as another rescue resort, here are the steps.

Step 1: Enter Command Prompt with Administrator's right

Click on the Magnifying Glass in Windows Quick Launch bar and search for "cmd".


You should be able to find "Command Prompt". Right click on it, and select "Run as administrator". This will open the Command Prompt window with Administrator's right.


Step 2: Change the Boot Menu Policy to Legacy

In the Command Prompt, type the following command and press .

bcdedit /set {default} bootmenupolicy legacy

This command edits the boot configuration data (BCD) to bring back the F8 safe mode function.

Upon successful execution, you will see the message "The operation completed successfully". You are done!


Step 3: Testing

Now, restart your Windows and test your F8 key. It should be able to call out the following Advanced Boot Options menu.


If for any reason you want to roll back and disable F8 during boot up, you can use the instruction in Step 1 to enter Command Prompt with Administrator's right again, and issue the following command instead:

bcdedit /set {default} bootmenupolicy standard

Monday, April 16, 2018

A family visit to Sewing World Gallery @ Sky Park One City Mall

In the older generation not too long ago, sewing machine had been a common item found in many household. At that time, sewing (and perhaps knitting, too) was an essential skill learnt by most housewives.

Then, sewing machine had been unconsciously become lesser and lesser seen in household nowadays. It prone to become industrial item found in clothes and fashion factories.

Meanwhile, the Mostwell Group which is the sole distributor of Janome sewing machines in Malaysia has been endeavoring to bring back the continuation of sewing arts and crafts into today's households by organizing numerous events, trainings and programmes to teach everybody from age 7 onwards who are interested to learn about sewing to master the skill.


The Sewing World Gallery located at 1st floor of Sky Park @ One City Mall with close proximity to the LDP USJ toll (accessible via a junction near to Shell petrol station) is an over 10,000 square feet gallery showcasing many sewing products made by their students. There, you will open your eye to realize that sewing is indeed a kind of arts and crafts similar to drawing, calligraphy, pottery, painting, etc.

 


Entrance to the Sewing World Gallery is free of charge. Inside the gallery there is also a small museum of sewing machines and tools, a small auditorium, and a classroom for interested parties to sign up for their sewing classes.

Sewing inspires creativity. They show you how old jeans can be transformed into new life as cushions, handbags, and other creative items.


There are also interested stuffed toys, some of which are as big in size as a human.


Inside the gallery, you can also find the largest bag in the world recorded in Guinness World Records which is as large as a garage.

There is also the largest display of handmade fabric flowers recorded in Guinness World Records, showcasing 99 names of Allah (known as Asma'ul Husna).


The Sewing World Gallery is really a nice educational place to spend your leisure time with your family and friend. If I am not mistaken, it is the first and only gallery of its kind in Asia.

Thursday, April 5, 2018

My Ooree 8 inch USB table fan (UF108)

If you need a small table fan at your workplace or study desk, or you tend to work with your laptop at outdoor café and nice to have some cooling breeze, perhaps you can consider this Ooree UF108 8 inch USB table fan.


This USB table fan is good enough to generate breezing wind that you can feel within 1 meter in front of it, yet its size (8 inch diameter end-to-end) and weight (416 gram) are also good enough for it to be portable.

It is powered by USB source, which can be the USB port of your laptop / desktop / monitor, or the USB charging port of your power bank / charging adapter. By powering it with a mobile electricity source such as  power bank, you can use it anytime and anywhere, such as during camping, during electricity blackout, etc. The fan has a low power consumption of around 2.5W only.

Its 1.2 meter USB cable is detachable. It has an on/off switch behind too.


It will have some noise of fan rotating during operation, but overall still considered pretty quiet.

Note that the 8 inch as advertised is the diameter of its metal frame. The diameter of its fan blade is around 5.5 inch only. Its build is pretty solid, despite its packaging box is hollow inside (without any foam or paper support) which does not provide much protection to the fan during delivery.


As you can see, its packaging box deformed during the courier process, which is the main complaint I have with this product. Luckily the fan is not too fragile and still in good condition during unboxing.

Its price is quite reasonable. If you search around carefully, you can find online seller selling it at less than RM20, despite most of the sellers are putting a price tag of RM30-RM40 to it.

There is another model UF110 which is 10 inch and with double speed control, selling at a higher price. If you need stronger wind, you can probably look into the UF110 model.


Saturday, March 24, 2018

My Cashido 10 second ozone anti-bacterial water-treatment machine

Ozone has been used over the past 150++ years for water treatment since its discovery by a German-Swiss chemist called Christian Friedrich Schönbein.

A brief history of ozone usage in water treatment is as below:

  • 1886: The ability of ozone to disinfect polluted water is recognized in Europe.
  • 1891: Test results from Germany show that ozone is effective against bacteria.
  • 1893: The Netherlands started to use ozone in large scale as disinfectant in drinking water.
  • 1906: France city Nice commissioned first municipal ozone plant for drinking water.
  • 1909: Ozone is used as a food preservative for cold storage of meats.
  • 1915: Ozone is widely used in Europe with at least 49 major installations throughout the region.
  • 1939: Ozone is found to be able to prevent the growth of yeast and mold during the storage of fruits.
  • 1965: Scotland employs ozone for colour control in surface water.
  • 1970: French exploited the use of ozone in algae control.
Today, Ozone is known to be a very strong oxidizing reagent which able to effectively:
  • Kill bacteria and viruses.
  • Remove 75% of pesticides.
  • Remove bad smell (such as fish-smell, smoke odour, etc.)
  • Remove colour formed by organic compound.
  • Keep food fresh.
  • Settle down heavy metals in water for easier filtration.
Its effectiveness is well supported by academic researches. To name a few of them:

 
 


However, Ozone in gas form, when inhaled into our lung, is harmful to human health. The following bodies have specified the safety level of maximum concentration of ozone permissible in occupied space:
  • FDA: 0.05 ppm
  • ASHRAE: 0.05 ppm
  • EPA: 0.08 ppm
  • OSHA: 0.10 ppm
My Cashido 10 second ozone anti-bacterial water-treatment machine is an electronic device that can generate ozone almost instantly and mix it with normal tap water to form ozonized water. Its operation is claimed to release less than 0.01 ppm ozone into the air, which is well controlled below the permissible level.


The ozone gas generated is directly transmitted via a soft silica tube to its ozone mixer installed at the water outlet of faucet. Therefore, very minimal amount of ozone gas is released into the air during its operation.

This machine has additional safety measures to prevent excessive ozone from being released into the air:
  • It only start producing ozone when it has detected water flow at the faucet. It will immediately stop working once the water flow stopped, or it detected the water is just dripping instead of flowing.
  • It will auto cut-off itself after 10 minutes of continuous operation, even if the water is still flowing.
  • It has 2 LEDs. The red LED will turn on when it is connected with electric power, even when it is in standby mode. The blue LED will turn on whenever it is generating ozone to be mixed with the water, and will turn off when no ozone is generated.
With the ozone in the ozonized water made by this machine, we can use the water to:
  • Wash our hands, face, legs and other body parts. (The machine can be installed for shower too)
  • Rinse our mouth and teeth.
  • Bath our pet(s).
  • Wash fruits, vegetables and meats (before refrigerator storage and/or before cooking).
  • Wash kitchen utensil, cups, bottles, baby products, toys, clothes, etc.
  • Clean the floor, table, kitchen, bathroom, toilet, etc.
  • Sanitize dentures, contact lens, etc.
  • Wash and sanitize pimples, surface wound, insect bites, etc.
This Cashido machine is called 10 second machine because the generated ozonized water only needs as short as 10 seconds to complete its function to oxidize, disinfect, deodourize and decompose pesticides & harmful materials of the target object you are washing or cleaning with it. If the contact is less than 10 seconds, then the washing/cleaning is considered partial, with some left out remains untreated.

Note that the ozone in the water has a short half-life of 20 minutes and will eventually disappear from the water (released as oxygen), leaving no residue in the water.

Therefore, ozonized water cannot be stored as it will soon lost its effect in disinfection of bacteria and viruses, pesticides removal, bad smell removal, etc. due to its short half-life period. It needs to be generated on the spot when use.

With this Cashido 10 second ozone anti-bacterial water-treatment machine, we can expect a more hygiene living environment, healthier & fresher food, and better health (by eliminating as well as preventing bad breath, body odour, Athlete's foot, skin problems, etc.).

Wednesday, March 21, 2018

High endurance microSD card suitable for use in car dashcam

If you have a car dashcam, you will need to install a microSD card in it to store its video recording and emergency photo taking.

Even though certain dashcams come with some amount of internal memory, the storage capacity of this internal memory just won't be enough, and you probably would not like to give your whole dashcam (instead of the microSD card only) as evidence for investigation in case it really captured some critical event that happened to your car.

Most people found that the microSD card installed in their dashcam is unable to last long and will be unusable within a few months of usage. Most memory card manufacturers also exclude warranty if they found out the memory card is used in dashcam. Why? Because ordinary memory cards are not designed to be used in tough working conditions in your dashcam.

What kind of tough working conditions for the memory card to work in your dashcam, which installed right behind your car windscreen?

  • It will need to be able to endure the sunlight heat entering and developed in the car. At noon, when your car is parked in uncovered place, its cabin temperature can easily go above 35 degree Celsius (if you installed good window tint with high TSER value) , and can possibly go beyond 65 degree Celsius if your car is non-tinted and stays for long hours under hot sunlight.
  • It will need to have high number of rewrite cycles for its lifespan. As you might aware, the electronic storage cells in the memory card has limited times of data rewrite. That is also the reason whereby disk defragmenting is highly discouraged for SSD hard disk as massive data rewrite will shorten its lifespan. Whenever your dashcam is working, it will keep on recording videos into your microSD card. If you are recording 1080p videos, it just takes a few hours to completely used up a 32 GB microSD card. When the microSD card is used up, older videos will be overwritten by new records, and the rewriting will occur.

Other than the above 2 essential conditions, the memory card used in your dashcam should also meet the following conditions:
  • Shock and vibration proof - if it got damaged while writing data during accident shock, you will have difficulty retrieving what it had recorded.
  • Water proof - what if the accident caused it to immerse in water?
  • Class 10 - this is the minimum read/write speed required to smoothly record 1080p full HD video.

By the way, certain memory card manufacturers also include the following conditions, which I consider as "marketing gimmick" as it should be true for all flash memory cards:
  • Magnetic proof - metal detector used for security scanning could induce magnetic field. Don't worry, only magnetic hard disk will be endangered by magnet. Flash memory should immune to magnet by nature. So, nothing to shout about.
  • X-ray proof - x-ray is used for security scanning in airports. Flash memory should immune to X-ray as well. Nothing to shout about either.

Therefore, you need high endurance microSD card that can fulfil all of the above conditions to work in your car dashcam, to last for at least 24 months of operations, or a minimum of 5,000 hours of continuous 1080p full HD video recording.

The high endurance microSD card should have an operating temperature range of around -25ºC to 85 ºC and storage temperature range of around -40ºC to 85ºC.


Some of the available high endurance microSD cards in the market include:
  • Sandisk high endurance video monitoring card
  • Transcend high endurance MLC microSD card
  • Silicon Power high endurance MLC microSD card
  • Kingston Industrial Temperature microSD UHS-I
  • Adata Premier Pro microSD UHS-I
The price of this kind of high endurance microSD card is much higher than ordinary microSD card. Among them, Sandisk high endurance video monitoring card has a relatively lower price, being a mid-range product of its kind. It has a 2 years warranty period which would not void even you use it in your dashcam.

Sunday, March 18, 2018

My experience sharing of using Intel Optane technology accelerated hard disk

Recently I have purchased a Dell XPS 8930 desktop computer which comes with an ordinary 1 TB SATA hard disk, paired with a 16GB Intel Optane memory card.



As advertised by Intel, "the Intel Optane memory is a smart, adaptable system accelerator for PCs with at least a 7th Generation Intel Core processor and a hard disk drive. It provides uncompromising system responsiveness for large capacity storage drives, making everything you do fast, smooth and easy."

Intel has put up a short video to explain what is Optane memory about and how its Smart System Acceleration works, as below:


The main purpose of this Optane memory is to boost up the performance of ordinary SATA hard disk, which capacity is generally much higher than SSD and price is much more cheaper than SSD, so that the data access time of the Intel Optane accelerated hard disk can be comparably as fast as SSD.

I have this Dell XPS 8930 desktop with 1 TB Optane accelerated hard disk as its storage, running on Intel Core i5-8400 CPU and 8 GB memory. I also have a Dell Inspiron 5370 laptop with 256 GB SSD as its storage, running on Intel Core i7-8550U CPU and 8 GB memory. Both of them are running on MS Windows 10 operating system.

In my personal experience of using this desktop with Optane accelerated SATA hard disk which has storage capacity 4 times larger than my laptop, its boot up time is almost instantaneous and faster than my laptop. This is really amazing.

Well, to be fair, the Intel i5-8400 Coffee Lake processor in my desktop with 6 cores 6 threads processing power, is having a higher performance benchmark than the Intel i7-8550U Kabe Lake R processor in my laptop with 4 cores 8 threads processing power. This would probably explain why the desktop boot up time is faster than the laptop. However, without the acceleration of Optane memory, its boot up time with SATA hard disk will be much more slower.

As for the loading speed of applications in the desktop, and the speed of opening data files, it depends on whether they have already been cached in the Optane memory or not. I can feel that their loading speed is about the same with loading from SSD when they are cached, and is as slow as loading from SATA hard disk when they are not cached.

There is no mechanism for me to control which piece of data to be cached and which not to be cached. It is automatically determined by the Optane memory card itself. I can tell from experience that those frequently used one will stay in the cache and load up pretty fast.

Intel provides 2 options of Optane memory capacity, one is 16 GB and another is 32 GB. I think the 32 GB one is of better pick as it has double the caching capacity. However, the Dell XPS 8930 selling in Malaysia does not provide option for buyer to opt for 32 GB Optane memory, as only 16 GB Optane is available.

All in all, I am happy with the performance of this Intel Optane memory in my desktop computer. The only drawback is that current Intel Optane technology does not support RAID storage. It can only work with raw SATA hard disk.

I haven't have experience in using SSHD hybrid hard disk. Perhaps the experience is similar. I am also wondering what makes the different of using Optane memory with SATA hard disk from using SSHD.

Thursday, March 15, 2018

How to determine a good car window tint film from TSER, UVR and VLT values?

The performance of car window tint film is generally determined by these 3 values:

  • TSER - Total Solar Energy Rejected. This is the overall solar energy filtered by the film. The higher the TSER, the more heat from sun is blocked from entering into your car through its windscreens and windows.
  • UVR - Ultraviolet Rejection. Ultraviolet rays can cause colour fading in upholstery and furnishings. It can also cause skin damage and skin cancer.
  • VLT - Visible Light Transmission. This is determined by the darkness of the film. The darker the film, the lower its VLT will be. Note that JPJ has regulation for the minimum amount of VLT allowed for the tint film, so the VLT need to be equal or above the permitted value to abide to the regulation imposed. As VLT contributes quite a large portion of TSER, it will affect the TSER value pretty significantly.

Traditionally, many tint shops tend to use IRR (infra-red rejection) as an indicator, but the infra-red wavelength spectrum is very long and there is no standard of how much of the spectrum to be used to measure IRR, some products claim to have high IRR by measuring only a short portion of it right after the visible light spectrum, which does not have much meaning for the real heat rejection performance measurement. Therefore, unless the wavelength spectrum of IRR is clearly specified and the measurement is until 2,500 nm or more, otherwise this value can be neglected as TSER can provide a more meaningful value for consideration.

So, how to determine a tint film is good, moderate or poor, based on its TSER, UVR and VLT values?

First we look at VLT value, as it's minimum requirement is regulated in Malaysia. A good VLT value should be as low as possible (so that the TSER value will also be lower) but should not go below the JPJ standard. Otherwise, the enforcement officer may ask you to remove your tints from your windows due to violation of this regulation.

The minimum allowed VLT currently imposed by JPJ is as follow:
  • Front windscreen: 70%
  • Front side windows: 50%
  • Rear side windows: 30%
  • Rear windscreen: 30%

The MS2669:2017 standard has set the requirements for tint film for the following 3 tests:
  • Solar test: VLT, UVT (opposite of UVR) and TSET (opposite of TSER).
  • Weathering test: TSET/TSER value should be stable for a period of 5 years with less than 4% degradation. This is simulated with 1,000 hours shining from solar mercury lamp.
  • Boil test: the tint film should not form bubbles under high temperature.


With reference to this MS2669:2017 standard, we can then determine the range of TSER and UVR which is considered to be good, moderate or marginal only.

TSER:
  • Good: > 50%
  • Moderate: 39% - 49.99%
  • Marginal: 25% - 38.99%
  • Failed: below 25%

UVR:
  • Good: > 99.5%
  • Moderate: 98.5% - 99.49%
  • Marginal: 98% - 98.49%
  • Failed: below 98%

Therefore, if you are looking for a good car window tint firm, you can look for those that meet the following realistic requirements:
  • TSER: 56% - 62%
  • UVR: 99.5% - 99.9%
  • Front windscreen VLT: 70% - 75%
  • Front side windows VLT: 50% - 60%
  • Rear side windows VLT: 30% - 50%
  • Rear windscreen VLT: 30% - 50%

Monday, March 5, 2018

My Remax CR-3XP Alien series 1-to-5 smart car charger

With more and more electronic gadgets such as air sterilizer, dashcam, GPS, etc. in the car, couple with the occasional need to recharge my phone and/or tablet while driving, the available charging sockets in my car is not sufficient to provide power to so much devices at the same time.

My solution is to have the Remax CR-3XP Alien series 1-to-5 smart car charger that can extend one car charging socket into 2 charging sockets with independent switch and 3 USB charging ports with combined power output of up to 3.4A.

This Remax CR-3XP smart car charger is designed to sit nicely in the car cup holder. It has 2 colour options: black+gold and white. The black+gold one looks nicer and is pretty hot selling, easily got sold out in the online shops.

This Remax CR-3XP smart car charger has an LED display, which will show the car battery voltage when its 3 USB charging ports are not in used. When either one or more of its USB ports is charging some gadget, the LED display will show the charging amperage.

The photo below shows my Remax CR-3XP smart car charger in action, sitting nicely in one of the car cup holders, with one of its charging sockets connected to my MedKlinn Autoplus air sterilizer.


You can notice that there are 2 buttons beside the LED display, one on its right and another on its left, which can be used to switch on/off the power supply to its 2 charging sockets respectively.

Saturday, February 17, 2018

Converting video files to be playable from USB drive in Honda 39102-T9A-T8XX-M1 display audio head unit

The Honda 39102-T9A-T8XX-M1 display audio is the stock head unit of Honda City 2017 Facelift 1.5L E/V variants.

It is able to play 4 types of multimedia files in a USB thumb drive: MP3 music, WMA music, JPEG photo, and MP4 video.

When the car parking handbrake is engaged, the video will display on the screen, otherwise, the video will become a blue screen while the music in the MP4 continue playing. This is a safety feature so that the driver will focus on driving instead of watching video on the screen. If you want to bypass this safety feature, you can search for a compatible "bypass cable" for this head unit and install it.

In order for any video to be playable in this Honda 39102-T9A-T8XX-M1 head unit, you need to convert it into MP4 format with the following custom settings:

  • Frame size: 640 x 480
  • Adjustment: Original
  • Video codec: MPEG4
  • Frame rate: 15 fps
  • Bitrate type: Auto
  • Audio codec: MP3
  • Channels: Stereo
  • Sample rate: 48000 Hz
  • Audio Bitrate: 320 Kbps

Conversion can be done using a free software called Freemake Video Converter.

Although the car audio manual claimed that it is able to play video in H.264 Base Line Profile format, I have not succeed to make it work with any H.264 video.

The car audio manual also claimed that it is able to support video frame rate up to 30 fps, but if you set the fps higher than 15, the video might not be playing smoothly on the screen.

As the car audio manual has stated that it supports VGA size video only, the frame size is best to be 640x480. If you set it higher than that, the video will be totally unplayable with the "not supported resolution type" error.

Luckily, this head unit is capable to play MP3 in pretty high sample rate and bitrate. Its music playing capability is quite OK, particularly with the 8 speakers in the V variant, despite its video playing capability is really primitive.

Saturday, February 10, 2018

EPF declared 6.9% (conventional) / 6.4% (shariah) dividend for 2017

The Employees Provident Fund (EPF, a.k.a. KWSP) has just declared the dividend rate for financial year 2017.

If you still remember, earlier on, EPF has launched its Simpanan Shariah Islamic saving account beside its conventional saving account. Members can apply to switch their account type from conventional to Shariah at their own will.

Year 2017 was the first year of dividend declaration for Shariah account, while dividend for conventional account has been declared annually since 1952.

For year 2017, the dividend declared for conventional account is 6.9% while for Shariah account is 6.4%. The dividend has already credited into members' account, and you can check for it by login into your EPF i-Account.



The 6.9% dividend for EPF conventional account in 2017 is 21% higher than the 5.7%  dividend declared for 2016 (last year).

Calculation: (6.90-5.70)/5.70 = 1.20/5.70 = 21%

It is also 7.8% higher than the 6.4% Shariah dividend declared for the same year.

Calculation: (6.90-6.40)/6.40 = 0.50/6.40 = 7.8%

It seems that members who had opted to convert their account to Shariah might be upset and regret, due to the lower dividend in 2017.

According to EPF, the Shariah account derived its income solely from its portion of shariah assets while for conventional account, a total of 38% of the income was generated by its share of Shariah assets and 62% from non-Shariah assets.

The returns for conventional account were enhanced by the income generated from non-shariah investments following the outperformance of global banking stocks, while Shariah account does not include conventional banking stocks due to their non-Shariah compliant status.

In addition, equity impairments from shariah-compliant stocks, particularly the oil and gas, and telecommunication counters, has lowered the income of the EPF's shariah portfolio.

Is the 6.9%/6.4% dividend considered good or not? The 6.9% dividend rate is the best since year 1996. However, EPF had been consistently declaring dividends of above 7% from 1976 until 1996! The dividend rate had even been consistently above 8% during 1980-1994. So, you judge yourself!

You can click here to check the historical EPF dividend pay-out rates from 1952 until today to have a clearer picture.


Thursday, February 8, 2018

Send e-Angpow with Presto and get back more cash than the amount you sent

Presto is an innovative homegrown social marketing and e-wallet platform by ACE-market listed PUC Bhd (0007). You can download the app for free in Google Play store and Apple iTune App Store.

In conjunction with the upcoming Chinese New Year 2018, Presto has enabled its users to send electronic red packets (a.k.a. e-Angpow) to their buddies in the app. The good news is, you do not need to top up any money into your Presto account to start sending your red packets.

Click here, and you can receive RM2 from Presto in your account after filling up the online form as shown below. Both new users and existing users are eligible to receive the RM2, provided you are the first 88 users of the day who submitted the online form, from 7 February 2018 until 13 February 2018.


Once you have received the RM2 in your Presto account, you can use it to send out red packet to one of your buddies. Just tap on the banner as shown below at the bottom of the app screen to start sending your red packets.



Alternatively, you can select a friend in your buddies list and there is an option for you to send red packet to the selected person too.

You can send any amount of money in your red packet, but please be noted that you need to send RM2 or more in a red packet in order to be eligible to play the Fortune Blast game.


The secret to get back more cash than the amount you sent is through this Fortune Blast game! If you sent out an RM2 red packet and it is opened by its receiver, you can easily get back at least RM5 from Fortune Blast.

If you are fast enough to blast more than 100 times within 8 seconds, your prize can be doubled to become RM10!


With the money you won from Fortune Blast, you can continue to send out more red packets to the rest of your buddies, and receive more chances to earn back even more money from Fortune Blast.

You can easily earn more than hundred within a very short period of time, even without any need of putting any money into your Presto account to start with. There is just nothing for you to lose, and many for you to gain.


In the end of the day, what can you do with the money in your Presto account? Currently, you can use it to redeem Presto deals. Later on, the money will be resided in your Presto e-wallet, which you can use to make payment at participating shops that accept Presto e-wallet payment method.

Click the link below to share this message to as many of your friends as possible, because you need them to also install Presto app in their phone before you can add them as your buddy and send/receive red packets with them.

Saturday, February 3, 2018

PTPTN announced 2017 dividend for SSPN-i and SSPN-i Plus (now SSPN1M)

The Malaysia National Higher Education Fund (Perbadanan Tabung Pendidikan Tinggi Nasional, PTPTN) has just announced dividend for year 2017 for the education savings schemes SSPN-i (Skim Simpanan Pendidikan Nasional) and SSPN-i Plus (now both of them combined and known as SSPN1M) on 30 January 2018.

The 2017 SSPN1M dividend payout rate is 4%, amounting to RM92.56 million. This rate is the same as previous payout for 2015 and 2016.

 In 2017, the amount of deposits in  SSPN1M was RM727.40 million, surpassing the original target of RM550 million, with 447,039 new accounts opened by depositors.

According to PTPTN, the number of SSPN1M accounts opened to date is 3.2 million, with deposits amounting to about RM3.3 billion.

Historical SSPN-i dividend payout rate is as below:

  • 2017: 4.00%
  • 2016: 4.00%
  • 2015: 4.00%
  • 2014: 4.25%
  • 2013: 4.25%
  • 2012: 4.25%
  • 2011: 3.75%
  • 2010: 3.25%
  • 2009: 2.50%
  • 2008: 4.00%
  • 2007: 4.00%
  • 2006: 4.00%
  • 2005: 4.00%
  • 2004: 3.00%

You can proceed to the Online SSPN-i Statement of Account website for checking of the transactions and amount of savings in your kid's SSPN1M account.

Friday, February 2, 2018

FIFA World Cup Russia 2018 soccer match schedule

The 2018 FIFA World Cup Russia is near the corner now!

It will start on 14 June 2018 and last for one month until 15 July 2018.


You can look up to the schedule of all its matches in this website:
http://www.fifa.com/worldcup/matches/index.html
You can also click here to download the match schedule in PDF file.

The time shown on the webpage is Russia local time. Just click on "change to your time" to switch it to your local time. Remember to adjust the date yourself because the date shown on the webpage will remain as the date in Russia as well.

The first match will be Russia vs Saudi Arabia at 14 June 2018 6pm.

You might also be interested to read about:

Thursday, January 25, 2018

Bank Negara increased OPR to 3.25%

As expected, Bank Negara (BNM) has, at its Monetary Policy Committee (MPC) meeting today (25 January 2018), made the decision to increase the Overnight Policy Rate (OPR) by 25 basis points from 3% to 3.25%.

This is the reverse of the last action taken on 13 July 2016, which reduced the OPR by 25 basis points from 3.25% to 3%.

For investors, if you are holding shares of financial institutions, this is a short term good news to you. If you are holding shares which the company is having high debt/equity (D/E) ratio, you need to evaluate how much will this OPR rise impact on the company's financial situation.

If you are planning to take a hire purchase (eg. buying a vehicle), act fast before the borrowing interest rate increases soon. If you are serving a home loan, expect your monthly commitment to your mortgage to slightly increase from now on.

You might probably also be interested to read about:


Hint: Click on the "Older Posts" link to continue reading, or click here for a listing of all my past 3 months articles.