Tuesday, October 30, 2018

Configuring Adaptive QoS in Asuswrt-Merlin

When your Internet connection is congested (most or all of its allocated bandwidth is used up) either from time to time, or most of the time, Quality of Service (QoS) is a mechanism for you to prioritize bandwidth usage based on network tasks and applications.

However, if your Internet connection is not congested most of the time (allocated bandwidth is hardly used up), it is advisable for you to turn off QoS function. This is because QoS won't make your Internet connection become faster, as your Internet connection is limited by your ISP allocation of maximum upload and download bandwidth. In fact, enabling QoS will incur additional workload to your router and your local network.

QoS is essential for a congested network to ensure that certain network tasks and applications will not be severely affected by the congestion by giving priority to their network traffic, at the sacrifices of those with lower priority. Turn on QoS when your Internet is congested will give you a better Internet experience if you configure it properly.

Bear in mind that QoS normally won't work together with Hardware Acceleration. Enabling QoS will cause the router to automatically shut down partial or all of the Hardware Acceleration function.

In the Asuswrt and Asuswrt-Merlin Game Boost screen, there is a LAN Boost - One Click Game First mode. That is actually a short cut to an adaptive QoS setting that turn on adaptive QoS and set Online Gaming with the highest priority of all network traffic. If you want to give the highest priority to other tasks such as Media Streaming instead of Online Gaming, make sure you turn off this LAN Boost - One Click Game First mode.

When you click into the Adaptive QoS menu, you will be presented with the Bandwidth Monitor screen. This screen is functioning regardless QoS is switch on or off in your router. It is a very useful screen to tell you the real time bandwidth usage of your network between the router.

Upload Bandwidth and Download Bandwidth is visually shown in the form of a speedometer. From this display, you can immediately know whether your Internet link is congested or not.

The same information is also obtainable in the Asus Router mobile apps connected to the router.


Below it is a list of hosts connected to the router, and their real time upload and download bandwidth usage respectively.

If you turn on Apps analysis, you can click on the icon of any of the hosts, and the screen will show a breakdown of bandwidth usage by the applications running in the host.


If you would like to turn on QoS function, recommended settings are as below:
  • QoS type: Adaptive QoS
  • Bandwidth Setting: Automatic Setting
  • Queue Discipline: fq_codel
  • WAN packet overhead: select the correct preset according to your Internet connection type
Click here if you are interested to understand more on the technical among the 3 queue disciplines of Stochastic Fairness Queueing (SFQ), Controlled Delay (CoDel) and Fair Queueing Controlled Delay (fq_CoDel).

You can then determine which kind of applications are going to have the highest priority to access the Internet: Games, Media Streaming or Web Surfing.

If you choose Customize, you are given control to customize the priority among the following traffic types:
  • Gaming
  • Video and Audio Streaming
  • VoIP and Instant Messaging
  • Web Surfing
  • File Transferring
  • Others
You can mouse over to each of them for more description of the traffic type respectively.

If you have QoS enabled, you can view the QoS Statistics screen to have an idea of the bandwidth usage by each of the traffic types.

Web History records down a log on the websites visited by the hosts. I find it no harm to enable or disable it. Even if you disabled it, it seems that the logging still be ongoing behind the scene. I also noticed that this Web History does not display every single website visited by the hosts.


Saturday, October 27, 2018

Configuring AiProtection in Asuswrt-Merlin and Asuswrt

One of the selling points for Asus wireless routers is their AiProtection feature, providing real-time network monitoring and protection with its Trend Micro Deep Packet Inspection engine. This is a kind of enterprise-level security made available in Asus home routers.

AiProtection is signature based, which you can update its signature in Administration > Firmware Upgrade > Signature Version > Check. This is of no rival to today's enterprise-level security that uses machine learning and/or deep learning technology, but it is much better than none.

Router Security Assessment check your router settings for security best practices. If you enabled something that has potential to decrease the security protection, it will warn you by flagging that setting as a risk. It will provide you a direct link to disable that particular setting.

However, if you are clear on your requirement to enable certain settings, such as port forwarding, you can just ignore the warning.


To get the best from AiProtection, you should enable all the features of Malicious Sites Blocking, Two-Way IPS and Infected Device Prevention and Blocking.

Malicious Sites Blocking will prevent any computer in your local network to access to known malicious websites that can bring harm to your computer, such as infecting your computer with trojans, viruses, malwares, ransomwares, etc. Your computers should be installed with antivirus and Internet security software that performs this job. However, you will be surprised that there might be still some sites not detected by your computer's Internet security software but eventually blocked by your Asus router. Enabling Malicious Sites Blocking will provide double-layer protection from malicious websites on top of your computer's Internet security software. If you have a firewall with similar function behind your router, then you will have triple-layer protection.

Two-Way IPS will detect and block exploitation of a known network vulnerability, either from the Internet into your local network, or from compromized computers or IoT devices in your network trying to attack other computers or IoT devices in the Internet. This will, to certain extend, help you to protect unpatched vulnerability of your computers or IoT devices from being exploited and hacked.

Infected Device Prevention and Blocking will try to block the communication between compromised computers or IoT devices in your network and the hacker's command and control server. In this way, the hacker will not be able to easily take remote control of your compromised computers or IoT devices.

If you click on the Alert Preference button and set your email (Gmail / AOL / QQ / 163) there, you will be able to receive email alerts from your router whenever AiProtection alert is triggered.


The firmware actually provide reports for these AiProtection features in their respective tab so that you can known what threats have been intercepted, and which hosts are affected.

Parental Controls consist of Web & Apps Filters and Time Scheduling.

Parental Controls are host based and block traffic based on the source MAC address of the host accessing to the Internet. It is automatically enabled if you set one or more family members in Asus Router mobile apps as below 18 years-old and assign one or more hosts under them. The mobile apps will block them from accessing to Adult websites.

Beside adult websites, Web & Apps Filters can also block a host from accessing to Instant Message and Communication, P2P and File Transfer, and Streaming and Entertainment in the Internet.

Note that you can expand each of the 4 categories for finer blocking settings. For example, Adult category consists of Pornography, Illegal and Violence and Gambling sub-categories.

Enabling Web & Apps Filters will consume some of your router's CPU and memory, and will make web browsing slightly slower.

If you are using Asuswrt-Merlin firmware, there is another alternative called DNS Filter to do the filtering at the DNS server.

Time Scheduling function allows you to set time blocks in each of the days in a week that a particular host is allowed to access Internet. Internet access will be blocked for that particular host when the time is outside the allowed timeframe. You can set multiple blocks within a day.

This is only useful if the host is dedicated to a person or some persons that need to obey to your time scheduling. If it is a shared computer used by the whole family, then every family member will need to obey to the time scheduling when using that computer. There will be no exception.

You will notice that if you have any of the Parental Controls settings enabled, there are additional Port Forwarding entries automatically defined in your router. Those Port Forwarding entries will disappear after you disabled the setting.

Parental Controls are nice features to have. For better router performance, you might want to disable them, unless necessary to use them to guard your children Internet access.

Friday, October 26, 2018

Configuring Guest Network in Asuswrt-Merlin and Asuswrt

If you are reluctant to give out your WiFi password to your guests who want to borrow your WiFi to get their mobiles devices to connect to the Internet when they are visiting your place, you can set up a Guest Network for them.

Guest Network is a useful function to allow guest or public Internet access while separating them from your own internal network. Asus Guest Network also has some advanced features for you to impose restrictions such as access time, bandwidth limiting, MAC filter, etc.

The Guest Network function in Asuswrt-Merlin firmware should be the same as in original Asuswrt firmware. It allows you to configure up to 3 separate Guest Networks for 2.4GHz wireless band and up to another 3 separate Guest Networks for 5GHz wireless band.

If your Asus router has two 5GHz wireless bands, then you'll have yet another 3 separate Guest Networks for your second 5GHz wireless band.


It is advisable for you to set an SSID for Guest Network that is different from your regular WiFi SSID.

If you set the Authentication Method to "Open System", anyone around your wireless router can connect to your Guest Network without the need of any password. It is advisable to set the Authentication Method to "WPA2-Personal" and set the WPA Pre-Shared Key as the password to connect to your Guest Network, which can be different from your regular WiFi password.

You can optionally restrict the Access Time of this particular Guest Network. For example, if you set the Access Time to 2 hours, the Internet access for this Guest Network will be cut off 2 hours after you clicked on the Apply button.

You can also optionally limit the Download Bandwidth and/or Upload Bandwidth for this Guest Network. If you set the value to 0 Mb/s or higher than your Internet access bandwidth assigned by your ISP, then it is not restricted.

If you enable Access Intranet, the devices connected to this Guest Network is able to access to networked devices connected to any of the LAN ports of your Asus router. If you use a switch to expand the network linked to a LAN port, all the devices connected to the switch are also accessible by the Guest Network. In this way, your Intranet is exposed to your guest.

If you disable Access Intranet, your guest won't be able to access to any networked devices connected to the LAN ports of your Asus router. However, they can still access to the devices connected to your WiFi, including those connected to your regular WiFi network.

If you want to also disable access to your WiFi connected devices, you can Set AP Isolated for a particular wireless band under Advanced Settings > Wireless > Professional. However, this setting is not Guest Network specific, and will affect all the devices connected to that particular wireless band.

If you want to only isolate the Guest Network from other wireless devices, you can explore into YazFi expansion for Asuswrt-Merlin. You can click here to find out more information about YazFi expansion in SNBForums, including its installation method and sample configuration file.

You can also optionally make use of MAC Filter to specify which mobile devices is allowed or not allowed to connect to this particular Guest Network.


Thursday, October 25, 2018

Update firmware of Asus wireless router to the enhanced Asuswrt-Merlin version

Asuswrt-Merlin is a 3rd party enhanced version of Asuswrt, which is the official firmware in used by all recent Asus wireless routers. Asuswrt was originally forked out from the Tomato-RT/Tomato-USB firmware, which in turn developed base on the codes of Linux-based HyperWRT, a 3rd party enhanced firmware for Linksys routers.

Asuswrt-Merlin is mainly developed and maintained by Eric Sauvageau (a.k.a. RMerlin) based on the Asuswrt firmware developed and maintained by Asus technical team.

Asuswrt consists of open sourced GPL codes as well as closed source proprietary components. Asus releases the source codes of Asuswrt firmware in their website, with the closed source portion included as compiled binary codes. This GPL release includes everything needed to completely recompile a working firmware, with the exact same features as found in their firmware releases, making it possible to enhance it into Asuswrt-Merlin firmware.

The general goal of Asuswrt-Merlin project is to provide an alternative to the original firmware, and remain in sync with Asus's own development of each firmware release, so that new features and bugfixes development in original Asuswrt firmware can be trickled down into the subsequent Asuswrt-Merlin firmware.

Asuswrt-Merlin is intended to improve but not to replace the original Asuswrt firmware functionality. Its priorities are: Stability > Performance > Additional Features.

The website of Asuswrt-Merlin is https://asuswrt.lostrealm.ca, and you can click here to view the list of its enhancements made on top of the original Asuswrt firmware.

There is an Asuswrt-Merlin forum in the SNBForums for community discussion and support of this firmware, and RMerlin himself is an active participant and moderator there.

To date, Asuswrt-Merlin is made available and supported for the following Asus wireless routers:

  • RT-AC66U_B1
  • RT-AC68U, RT-AC68P, RT-AC68UF, RT-AC1900, RT-AC1900P
  • RT-AC86U, RT-AC2900
  • RT-AC87U
  • RT-AC88U
  • RT-AC3100
  • RT-AC3200
  • RT-AC5300
You can check for new release of Asuswrt-Merlin firmware at the following places:
  • If your router is already installed with Asuswrt-Merlin firmware, you can check for new firmware version by clicking the Check button in Administration > Firmware Upgrade > Firmware Version in the firmware's web GUI.
  • By manually searching for new topic in Asuswrt-Merlin forum with title "[Release] Asus-Merlin 384.x is now available".

You can click here to go to the download webpage of Asuswrt-Merlin firmware in its website, or click here to go to its main download site at SourceForge.

At the SourceForge download site, select your Asus router model correctly, then select Release, and download the latest version of firmware accordingly. The firmware is packaged in a ZIP file.

After the download, you need to unzip the file. Before uploading the firmware file to your Asus router, it is advisable for you to check for its SHA256 signature and match it with the checksum information inside the sha256sum.sha256 file. This is to make sure you won't upload a corrupted file to your router and potentially brick the router.

The easiest way to perform a file checksum in Windows is by using 7-Zip. Once you have installed 7-Zip in your Windows computer, you can right click on the file, select "CRC SHA" and then select "SHA-256" to get the SHA256 signature of the file.



If you want to install Asuswrt-Merlin firmware into a new router, make sure you have gone through the Quick Internet Setup wizard to get the initial configuration of the original firmware. You don't need to do this if you are installing to router already in used, be it currently running on original Asuswrt firmware or Asuswrt-Merlin firmware.

It is advisable for you to manually record down your major settings by using printscreen, and also make a backup of your existing settings by going to Administration > Restore/Save/Upload Settings. Save both your Router Settings and JFFS Partition (the later might not be applicable to stock firmware) to your local computer.

Then, you can proceed to go to Firmware Upgrade section, click on Choose File, select the Asuswrt-Merlin firmware file which you have downloaded, and Upload it to your router. The firmware updating process will begin, and your router will be rebooted.

Normally, your router will be up-and-running with no lost of previous settings after the firmware update. If you find it not working properly, you can try to Initialize your router to Factory Default, take out your printed screens and redo all your settings from scratch. If you still facing any problem, you can go to SNBForums and seek for help there.


Tuesday, October 2, 2018

Heat dissipating solution for Asus RT-AC86U router with USB cooling fans

The Asus RT-AC86U wireless router has a stand-up design and its heat management is relying on passive cooling.

Unlike those flatbed routers which we can easily provide heat dissipating solution to them by using normal laptop USB cooling fans, the temperature management solution for this stand-up router needs some tweaking to attach external fans to it. Luckily, there is ready made solution in the market, and it is quite cheap too.

If you are using AsusWRT-Merlin firmware in the router, you are able to read the runtime temperature reported at its Broadcom BCM4709 processor (CPU), Broadcom BCM4365E 2.4GHz WiFi SoC chipset and Broadcom BCM4366E 5GHz WiFi SoC chipset respectively.

In normal operation, the temperature at 2.4GHz WiFi chipset stays around 50-55 degree Celsius and the temperature at 5GHz WiFi chipset stays around 55-60 degree Celsius. However, the dual-core CPU temperature is always on the high side, staying above 70 degree Celsius, and there are users reporting that it can go up to above 90 degree Celsius.

If you are feeling uncomfortable with these kind of temperature readings and would like to lower them down to a more comfortable level, you just need to install a pair of external USB cooling fans at the back of the router.


The two 7cm fans are powered by 5V DC from the USB 2.0 port of the router itself. You can also plug it to the router's USB 3.0 port, but that port is normally used by external storage, USB Internet dongle, etc.

It is attached to the back of the router using 3M double-sided tape provided in the cooling fans set package.

Within 20 minutes, the pair of fans are able to cool down about 5 degree Celsius to both the 2.4GHz and 5GHz chipsets respectively. They can effectively cool down the temperature of the CPU by a whopping 20 degree Celsius.


With this heat dissipating solution, now the temperature at the 2.4GHz chipset reduced to around 45 degree Celsius, and the temperature at the 5GHz chipset reduced to around 52 degree Celsius. The CPU temperature greatly reduced to around 53 degree Celsius.

If I power down the fans by unplugging it from the router's USB port, all the 3 temperature readings will gradually increase, and went back to the previous high level within 20 minutes.


The fans are rotating at relatively low speed at 2100 RPM, making them pretty quiet. You can hardly hear their noise unless putting your ear very close to them during silent night.

According to their specifications, their noise level is at 18 dBA only. Their lifespan is around 50,000 hours, which is equivalent to over 2000 days, long enough to serve for the entire lifespan of the router.

Other than Asus RT-AC86U, this pair of USB cooling fans can also be used for Asus RT-AC68U router as both of them are having very identical size and casing build.



Monday, October 1, 2018

My Asus RT-AC86U AC2900 wireless dual-band MU-MIMO gigabit router with TM UniFi and Maxis Home Fibre support

The Asus RT-AC86U is a multimedia wireless router with gaming support, which you can also classify it as an entry level gaming router. For more powerful gaming router that gives you great online gaming experience, you should look for the ROG series instead.

It is the successor of the popular Asus RT-AC68U router, with similar stand-up design, identical front LED panel, rear connectors and buttons, but the internal circuit board is totally different. Thanks to this stand-up design, it has a much smaller footprint compared with those flatbed routers.


The CPU of this Asus RT-AC86U is powered by a dual-core Broadcom BCM4906 64-bit processor clocked at 1.8GHz (ARM v8 Cortex A53 architecture built with 28nm technology), which is apparently more powerful than the Broadcom BCM4709 processor used in Asus RT-AC88U AC3100 wireless router.

More powerful CPU provides better user experience for the more CPU intensive tasks, such as when using USB 3.0, SMB v2, data encryption, etc.

This Asus RT-AC86U is an AC2900 wireless dual-band MU-MIMO gigabit router. Oddly, it has lesser number of antennas compared with most of its counterparts in the market. It has 3 dual-band external antennas and 1 more internal antenna for the 5GHz radio band. Well, do not be fooled by this appearance. Indeed, its wireless signal strength and reach is pretty powerful.

Powered by Broadcam's NitroQAM support with 1024-state quadrature amplitude modulation (1024-QAM), if the connecting wireless device is also supporting 1024-QAM, each data stream of its 2.4GHz band can have a maximum data transfer rate of 250Mbps, and each data stream of its 5GHz band can have a maximum data transfer rate of 541Mbps. Both are 25% higher than the older TurboQAM technology (each 2.4GHz band = 200Mbps, each 5GHz band = 433Mbps) in used by predeccessing wireless routers such as Asus RT-AC68U.

Its 2.4GHz radio band is powered by a Broadcom BCM4365E 3×3:3 SoC chipset, able to serve a combined maximum data transfer rate of 3 streams of 250Mbps = 750Mbps.

Its 5GHz radio band is powered by a Broadcom BCM4366E 4×4:4 SoC chipset, able to serve a combined maximum data transfer rate of 4 streams of 541Mbps = 2,164Mbps.

However, most of the mobile devices nowadays are still using the 256-QAM technology, which supports maximum data transfer rate of 600Mbps in 2.4GHz and 1,733Mbps in 5GHz. Only the latest mobile devices with 1024-QAM support are able to unleash its full potential of serving 750Mbps in 2.4GHz and 2,164 in 5GHz.

The 2.4GHz wireless network of this router just performs a decent job, on par with other good quality wireless routers. Its main strength is on the 5GHz wireless network, which surprisingly having a very strong, far and stable reach. It is still detectable and accessible in locations which are beyond the reach of the 5GHz wireless network of my previous router.

With this Asus RT-AC86U router serving from the middle of my house, I don't even need to use any range extender to have stable and fast WiFi in every corner of my house. The WiFi signal, powered by Asus Range Boost technology and AiRadar beamforming, can also be detected further away from outside the house.

This Asus RT-AC86U has a total flash memory of 256 MB, and RAM of 512 MB. Both are doubled when compared with Asus RT-AC68U. It is pretty feature rich, configurable through Asus' famous AsusWRT web interface.

It has dual WAN support, which the second WAN link can be supplied using a 4G USB dongle or USB modem, or making use of one of its gigabit LAN ports for WAN purpose. The secondary WAN link can be configured for load-balancing or standby as failover backup link.

It supports TM UniFi IPTV by simple setting and connecting its LAN Port #4 to the TM UniFi set-top-box. It also supports IPv6 flawlessly.

It supports up to 3 separate Guest Networks in the 2.4GHz band, and up to another 3 separate Guest Networks in the 5GHz band.

Being a multimedia wireless router, it has features such as AiCloud 2.0 which enables the router to provide file server function and even media server function by attaching USB storage device such as USB thumb drive or USB external harddisk to its USB 3.0 port.

You can configure for the file server function and/or media server function to be accessible from local network only, or even from the Internet. Having dynamic WAN IP is not a problem, as you can configure the router to make use of DDNS service, so that you can always connect back to your router with its DDNS domain name.

By making use of Samba service, it can also provide Smart Access function for you to remotely access through Internet to the shared files and resources in your local network.

Access to AiCloud 2.0 can be made via its web interface, or by using the free AiCloud Android or iOS mobile app.


Its USB 3.0 file sharing is pretty fast. Accessed from LAN, my Transcend StoreJet 5400 rpm 1TB portable hard disk with NTFS partition attached to the router is accessible with a read speed of 101 MB/s (808 Mbps) and a write speed of 89.9 MB/s (719.2 Mbps).



It provides AiProtection feature with Trend Micro, with malicious sites blocking, 2-way IPS and infected device prevention & blocking. This is able to give you an additional layer of protection at the network perimeter, on top of the antivirus/anti-malware protection that you installed in your computers. You would not be surprised to see AiProtection successfully intercepted some malicious website accesses that skipped through your computer's antivirus/anti-malware screening.

It also equipped with Parental Controls function that enable you to block access to websites of certain criteria (such as adult websites). In addition, you can set time scheduling for the computers and network devices in your network so that they are restricted to access the Internet during certain time period.

Parental Controls works best together with the free Asus Router mobile app available for Android and iOS. In the mobile app, you can define which network devices are used by which family member, and the mobile app will block the adult websites for your children under 18 years old.


Its Adaptive QoS function enables you to set priority for certain network traffic, useful for online gaming. You can also configure it to make use of WTFast Gamers Private Network for faster online gaming experience.

This Asus RT-AC86U has quite frequent firmware updates, particularly to patch up security issues or to fix performance issues. Other than using the stock firmware, you also have option to install customized firmware such as the AsusWRT-Merlin firmware which is developed based on the stock firmware and more emphasis on security, usability and stability.


Saturday, September 22, 2018

Quick and effective fix for Whatsapp voice call intermittent quality problem

There are quite a lot of occasions I experienced intermittent quality problem when making or receiving WhatsApp voice call. The sound from the other party just couldn't transmit well to my phone.

This kind of intermittent situation occurred even when I was connected to 5 GHz WiFi with high speed fibre Internet access, and I was very sure that the network utilization during the call was low without any congestion at all.

After some trial and error attempts to improve the situation, I finally found out the solution to fix this WhatsApp voice call intermittent problem.

You just need to change one setting in WhatsApp, and your WhatsApp voice call will be magically turned from intermittent to very clear.

If you are also experiencing similar problem with WhatsApp voice call, try go to Settings > Data and storage usage > Call settings and enable "Low data usage".


I am not sure what does WhatsApp do behind the scene with this setting turned on, but it does magically fixed my voice call problem. It works both when using WiFi or using mobile data.

Tuesday, September 18, 2018

Wegmans (WEGMANS, 0197), a furniture company that growing on and growing up

Recently listed in the ACE market in March 2018, Wegmans Holdings Bhd (WEGMANS, 0197) is a wood-based (mainly rubberwood) home furniture manufacturer, targeted for the medium-income level customers. Its products are sold both directly to customers and also through agents.


This holding company only has a single 100% owned subsidiary called Wegmans Furniture Industries Sdn Bhd which carries out the actual furniture designing, manufacturing and selling business.

If you are unfamiliar about this company, the 8 minutes corporate video below will give you a good idea about its background.


In its IPO, 100 million shares were placed out at the price of RM0.29 per share at the placement proportion as follow:
  • 25% - Malaysian public
  • 15% - Directors, employees, business partners, suppliers & customers
  • 10% - Private placement to institutional and selected investors
  • 50% - Private placement to identified bumiputera investors
Its IPO was well received with an over-subscription of 16.38 times. Its price closed at RM0.295 during the first trading day on 6 March 2018.

The proceeds from IPO were allotted as follow:
  • RM11 million for construction of new factories
  • RM11 million for purchase of new machineries and equipment
  • RM3.5 million for working capital
  • RM3.5 million for listing expenses
Therefore, it is pretty clear that the purpose of its IPO is for expansion and fuel for continuous growth.

The key historical milestones of WEGMANS is as below:
  • 1994 - Wegmans Trading founded with a small factory on a piece of 2,000 sqft. rented land at Jeram Masjid, Muar, Johor, to produce and supply furniture parts for wooden dining chairs and sofas to local furniture manufacturers.
  • 1997 - Production floor space expanded to 6,000 sqft.
  • 1999 - Wegmans Furniture was established to replace Wegmans Trading, with an aim of becoming a furniture manufacturer and exporter.
  • 2000 - Started to manufacture and sell dining tables and dining chairs.
  • 2001 - Production floor space expanded to 14,000 sqft. Began to export products to customers in South Korea and Australia.
  • 2002 - Started exporting to more countries including Belgium, Denmark, Finland, Germany, Greece, Netherlands, New Zealand, Saudi Arabia, Spain, Singapore, Sweden, United Arab Emirates and USA.
  • 2003 - Widened product range to include living room furniture.
  • 2004 - Production floor space expanded to 18,000 sqft.
  • 2005 - Began spraying works in Block B (49,400 sqft). Widened product range to include bedroom furniture.
  • 2006 - Factory Block A (55,952 sqft) started operation.
  • 2009 - Total export markets to 44 countries.
  • 2010 - Factory Block C (42,846 sqft) started operation.
  • 2012 - Obtained ISO 9001 certification
  • 2015 - Purchased 254,436 sqft land to build own factory for raw material storage and wood preparation. Will be operational soon in 2018 to takeover current facilities on a piece of land rented from Poh Huat (POHUAT, 7088).
  • 2016 - Purchased 905,397 sqft land for production expansion.
Today, WEGMANS revenue is still heavily depend on dining room furniture. Its proportion of revenue contribution is as follow:
  • 93.13% from dining room furniture
  • 4.17% from living room furniture
  • 1.67% from bedroom furniture
  • 1.03% from others
Its major customers are:
  • Nitori Co Ltd, Japan (17.73% revenue contribution)
  • Super A-Mart Pty Ltd, Australia (10.22% revenue contribution)
  • Home Retail Group (Hong Kong) Ltd, United Kingdom (5.64% revenue contribution)
Its major suppliers are:
  • Chinfon Timber (7.03% of total purchases)
  • Plymax Veneer Sdn Bhd (10.42% of total purchases)
Price and supply-demand situation of raw materials, particularly rubberwood, is a kind of risk that might affect the business and financial of WEGMANS. Anyhow, WEGMANS has not been hit with this kind of issue, as they maintain many years of good long-term relationship with suppliers.

99.03% of its revenue is derived from exports to over 70 countries around the world. Of which, there are 14 countries with consistent export orders, namely: Australia, Canada, Denmark, Estonia, France, Germany, Japan, Korea, Norway, Singapore, Spain, Sweden, United Kingdom (UK) and United States of America (USA).

The revenue contribution from export countries are as below:
 
Since WEGMANS is export oriented, it is exposed to foreign exchange risk. Every 5% change in USD/RM exchange risk will bring fluctuation of RM430,000 to its profit after tax. Since the USD is strengthening against most of the currencies including MYR over the past few months, this situation is expected to have positive effect to WEGMANS upcoming 2018 Q3 financial result to be announced in November 2018.

(USD/MYR chart generated from Bloomberg website)
 
WEGMANS develops and maintains its competitive strengths through:
  • Own design and development
  • Stringent QC
  • Established business relationships
From these information, we can view that WEGMANS is able to maintain its bargaining power towards customers and suppliers, and able to sustain against threat of new entrance and threat of substitute products.
 
It is also able to maintain quite a sustainable competitive advantage.
 
 
WEGMANS currently has a staff strength of about 600, of which 84.22% are foreign workers.
 
The furniture industry is labour intensive, unless more automation is employed.
 
Any change in foreign worker policy in Malaysia or in the countries which the foreign workers are employed from, may result in difficulties for them to maintain a sufficient foreign labour workforce.
 
In addition, cost of hiring labour may increase in the future and they might not be able to pass on such increase in cost with corresponding increases in the prices of their products.

Furthermore, their future expansion plan requires a significant increase in labour to meet increased manufacturing activities.
 
There may also be disruption in the supply of foreign workers to Malaysia, which may delay them to hire new foreign workers in time after the expiry of the contracts of the existing foreign workers.

As a result, their business operations and financial performance may be materially and adversely affected. It is imperative for them to go for more automation and furthermore to embrace the Industry 4.0 revolution.
 
Other risks inherent in the furniture industry include fire hazards and disruption to electricity supply.

WEGMANS is led by 2 key senior management persons.
 
Mr. Keh Wee Kiet, 48, is its managing director who in charge of strategic planning and overseeing the manufacturing operations of the company. He has more than 24 years of hands-on experience in the furniture industry.
 
He is the main founder who built and grew the business from a sub-contractor to a reputable exporter, especially during the period when Mr. Collin Law was still a sleeping partner before he eventually joint as executive director in 2005.
 
Mr. Collin Law Kok Lim, 48, is its executive director who is currently responsible for overseeing their business development and Design and Development (D&D) departments.
 
He joined as the Executive Director in February 2005 to set up the sales and marketing department to secure customers directly so as to reduce the reliance on third party agents. In the same year, he was also instrumental in setting up the D&D team.
 
He keeps abreast with the latest market developments globally by participating in international furniture trade exhibitions and events.
 
WEGMANS practices a good corporate government by having different person as board chairman and managing director.
 
The chairman, Mr. Chan Wan Seong is an independent non-executive director. He is primarily responsible for matters pertaining to the Board and the overall conduct of the Group.
 
The distinct and separate roles of the Chairman and Managing Director, with a clear division of responsibilities, ensure a balance of power and authority, such that no one individual has unfettered powers of decision-making. The Managing Director oversees the day to day management and running of the Group and the implementation of the Board’s decisions and policies.
 
In 2017, the 2 executive directors received annual remuneration below RM400,000, whilst the 3 non-executive directors received annual remuneration below RM50,000. This is pretty reasonable.
 
In 2017, WEGMANS trade receivables increased from 4.8 million to 6 million, whilst trade payables increased from 10.3 million to 12.5 million. The working capital situation is in control.
 
Credit risk is minimal, as trade receivables past due in 2017 is only RM308,520 (2016 was RM385,925).

As revealed in Annual Report 2017, WEGMANS has only 1,121 shareholders, of which 70% shares are held by the 2 executive directors. Top 30 shareholders are holding 88.6% of the shares, leaving only 11.4% with minority shareholders.
 
Construction work has already commenced on the 905,397 sqft (20.8 acres) land purchased in 2016 in Mukim Parit Jawa, Muar, Johor. It is broken down into 3 phases.
 
Phase 1 is to built the following using the proceeds from IPO:
  • New head office and showroom (36,198 sqft)
  • Workers' hostel (140,272 sqft)
  • 1 factory (144,494 sqft)

Construction of the building has been approved by MPM on 29 July 2018.
 
 
 
The construction work has already started. Estimated completion is by early 2019.
 
 
The new factory in Phase 1 will be able to double up WEGMANS annual production of chairs from current 0.48 million to 0.96 million, and tables from current 0.19 million to 0.38 million.

The HQ and showroom will also be shifted to this new building, and the existing HQ will be converted into documents storage room, production office and expanded D&D office.
 
Phase 2 construction will build another 2 factories with land area of 211,079 sqft, and Phase 3 will build another factory on the remaining land area of 151,512 sqft.
 
Based on current total share issued of 500 millions after IPO, WEGMANS past 4 years financial result is as below:
 
 
The slight reduction in net profit in 2017 was due to higher labour cost arising from higher sub-contract wages incurred to meet the production requirements and delivery deadlines for their sales orders.

WEGMANS net debt in 2017 stood at RM19.7 million, forming a Debt/Equity ratio of 56.29%. Hopefully this can be reduced with higher revenue and profit generated, especially after the doubling up of production capacity soon.

WEGMANS past 3 announced quarterly results are as below:


Note that 2018 Q1 net profit was dragged down by a one off charge of listing expenses amounting to RM1.71 million.

WEGMANS share price closed at 34.50 sen on 14 September 2018. Its estimated PE based on 4 trailing quarters, assuming its 2018 Q3 EPS stood at 0.75, will be 19.6.

Its past financial results show that it has been in a growing path.

Its 3 phases future plan with 4 upcoming new factories show that it is well prepared for future growth.

WEGMANS is showing traits of continuous growth, and it is anticipated that its growth will be boosted once its new factory commence operation to double up its production capacity.

WEGMANS has laid out their future plan and strategies as follow:
  • Market penetration - increase production capacity
  • Market development - diversify customer base
  • Product development - increase product range and develop new product designs
On top of these, WEGMANS could be further improved if they could consider to:
  • Employ more automation and embrace for Industry 4.0 to reduce dependency on foreign workers.
  • Put up measure to reduce the Debt/Equity ratio to 30% or below.
  • Gradually increase its dividend yield.

Disclaimer: This article is intended for sharing of point of view only. It is not an advice or recommendation to buy or sell any of the mentioned stock counters. You should do your own homework before trading in Bursa Malaysia.

Monday, September 17, 2018

Pick the right Ethernet LAN cable to suit your high speed fibre Internet access (Cat 6, 6a or 7)

With the fibre optic WAN infrastructure successfully laid in more and more areas nowadays, ISPs are making available to household and commercial Internet access with real high speed of hundreds of Mbps or even Gbps, which make possible streaming of VR gaming or watching of 8K videos through the Internet.

However, in order to get the best from the high speed fibre Internet access that you are subscribing from your ISP, the network infrastructure inside your house or office which connect to the ISP's broadband termination unit (BTU) at your premise needs to also support at least gigabit Ethernet LAN, or else your network speed is still capped with your own low speed infrastructure.

All these components in your premise should support at least gigabit Ethernet LAN:

  • Your ISP should supply you a modern BTU with 1,000 Mbps (1 Gbps) or even 10,000 Mbps (10 Gbps) LAN port. Older equipment could have LAN port which support up to 100 Mbps only.
  • Your router connecting to the BTU should have 1,000 Mbps (1 Gbps) or even 10,000 Mbps (10 Gbps) WAN port and LAN ports. Older equipment could have WAN and/or LAN ports which support up to 100 Mbps only.
  • Your firewall, network switches, and any other network equipments should also support gigabit Ethernet.
  • The network card in your computer, printer, CCTV, IoT devices, and so on which need to enjoy the high speed of gigabit network such also support network connection of 1,000 Mbps (1 Gbps) or even 10,000 Mbps (10 Gbps). It is OK for some of them, such as network printer, to support lower network connection, because the paper printing speed is much slower than the network data transmission speed. If they are connected using WiFi, your WiFi access point (AP) and the connecting devices should support for 5 GHz wireless connection with MU-MIMO technology.
There is another important network infrastructure component in your LAN that needs to have support for gigabit network in order for you to enjoy the high speed network, which are all the network cables that:
  • Connecting your ISP BTU to your router
  • Connect your router to your firewall, network switches, WiFi AP, etc.
  • Connecting your computer, printer, CCTV, IoT devices, etc. to your LAN.
It is advisable for you to use at least Cat 6 cable, or better still Cat 6a or the latest Cat 7 cable. Why? Refer to the table below for their differences:

 
The industry standard cable shielding mechanism of twisted pair network cable, to reduce electromagnetic interference, is as follow:
  • UTP - unshielded
  • STP - braiding shield
  • S/FTP - braiding and foil shields
Therefore, to be "future proof", it would be a wise choice to opt for Cat 6a or Cat 7 cables now to be ready for 10 Gbps super high speed network.

Friday, August 31, 2018

Free Android app to scan, read and generate QR codes and barcodes (ad-free)

There are quite a lot of QR code scanner in the Google Play Store nowadays. Some can also read and interpret QR code from a graphics file saved in the phone. There are also a few even capable to generate new QR code for you.

However, not all of them are free. And, most of the free one are not ad-free.

I have found one that really impress me. It is a 3-in-1 QR code scanner, reader and generator app, very simple to use, and most importantly, it is free for use and ad-free. This means it won't bombard you with any annoying ads!

This Android app is called QR & Barcode Scanner, QR Code Reader, QR Generator offered by Digital Seo Web. You can click here to download and install it from Google Play Store.


By using the phone's camera, it is able to scan and interpret most if not all QR codes and also 2D barcode types including text, website link, product, ISBN, contact, email, calendar, location, Wi-Fi, data matrix, EAN, UPC, Code39, Code128, Codabar, ITF, EAN8 and many other formats.

The app has a trigger for you to turn on your phone's flashlight during scanning environment with low light condition.

Upon successful interpreting of the scanned code, the result will be displayed on the screen, and you will be given options to open the web URL (for website link), save contact information to your phone contacts (for business card QR code), access to WiFi (for WiFi credential QR code), send it out as email, send it out as SMS, share it to other apps, or export it to a CSV file which will contain the date, type and interpreted content of the code.


This app has a very clear-cut menu.

You can read the QR code or barcode saved as PNG, JPG or other graphics file by using the Gallery function.

You can generate your own QR code by using the Generate function.

You can look back at the past scanning/reading results by using the History function.


This app is able to generate quite a number of QR code types, including personal profile, business profile, contact number, SMS message, plain text, email, website URL and company profile.


You can save the generated QR code as a JPG file in your phone by tapping on the "download" icon at the top-right corner. You can also share the generated QR code to other apps.


This app seems to be pretty new in Google Play Store, but it is really amazing. I highly recommend it for all Android phone users who are looking for a free, modest and ad-free QR code scanner, reader and generator.

Sunday, August 26, 2018

DIY applying for China visiting visa with Kuala Lumpur CVASC using online appointment

Malaysian passport holder who intends to visit to China needs to apply for a valid visa before making the travel, as there is currently no visa exemption arrangement between China and Malaysia yet.

Application for the required Chinese visa needs to be done in the office of Chinese Visa Application Service Center (CVASC) available in Kuala Lumpur, Penang and Kuching. You can either complete the whole process by yourself, or choose to make the visa application through an agent, which will charge you additional fees for their service.

In fact, the process to apply for Chinese visa is pretty straightforward and fast provided you follow the procedure correctly.

The Kuala Lumpur CVASC office is located in Hampshire Place, Jalan Mayang Sari, 50450 Kuala Lumpur. You can take the LRT there by coming out from either Ampang Park station or KLCC station. The Hampshire Place building is within walking distance behind the Bank of China building.

If you drive there, you can park in the visitors car park of Hampshire Place, but the parking lots are quite limited. In case the parking at Hampshire Place is full, you can park your car in the visitors car park of Megan Avenue 1 just across the road.

Here is the procedure to apply for the China visiting visa by yourself with Kuala Lumpur CVASC.


Step 1: Get ready the required documents

You will need:

  • A valid passport with more than 6 months before expiry date.
  • Your passport must have at least 2 empty pages. The visa itself will take up one full page.
  • A photocopy of your passport page with your personal information and photo, and the adjacent page with your signature.
  • 2 pieces of passport size photos. Make sure the background of the photo is white (not blue) in colour.
  • If you are travelling as tourist, you will need to submit a photocopy of your air ticket.
  • If you are travelling for business trip, you will need to submit a letter of invitation from China and a letter of dispatch from your company in Malaysia. There are certain criteria needs to be explicitly printed in both the letters, including your personal particulars (full name, gender, date of birth, etc.), detail of the company that issued the letters respectively (name, contact, address, official stamp, etc.) and your visit itinerary. The date of both the letters must not be longer than 3 months from the date of visa application.
You can apply for single-entry visa or multiple-entry visa. If you intend to apply for multiple-entry visa, you need to also photocopy your passport page containing your previous Chinese visa which was applied less than 2 years ago. For first time visit to China, you can only apply for single-entry visa or double-entry visa.

Fees will be higher for multiple-entry visa. The current schedule of fees is as below:



Step 2: Fill up the online visa application form and make the online appointment

In order to complete this step, you will need:
  • A computer connected to the Internet.
  • The computer is installed with Adobe Acrobat Reader.
  • The computer is connected to a printer.
  • Preferably to access the online visa application form and online appointment form using Google Chrome.
When you are ready, click here to go to the Kuala Lumpur CVASC Quick Access webpage. You might want to bookmark this URL for future access.


After you have reached the webpage:
  • Click on the button inside the Application form box in the webpage.
  • Follow the step-by-step instruction to fill up the online visa application form.
  • Save your form online, and go through all the fields to review it. Make sure all information is correctly filled up.
  • Finalize and print out your visa application form.
  • Don't forget to manually sign on the printed application form.
  • Don't forget to attach with your passport size photos (with white background) and all the supporting documents.
  • Click on the button inside the Appointment box in the webpage.
  • Fill up the online appointment form.
  • Submit the appointment form online, and print out the confirmed appointment slip.

Step 3: Visit to CVASC for document submission

On the date and time of your appointment, bring your original passport, photos, all supporting documents and the appointment slip to CVASC office at Level 5 of Hampshire Place.

At the front counter, submit all your documents for checking. If all your documents are complete, you will be given a queue number.

Wait for your number to be called, submit your documents to the officer, and you will be given a pickup form with the date to collect back your passport.


The whole process should take less than 30 minutes from the time you step in Level 5 to the time you step out the office.

No payment is needed during document submission. You will only need to pay during passport collection.


Step 4: Visit to CVASC for passport collection

On the day of passport pickup, just bring along your pickup form and visit CVASC office at Level 6. There is no specific appointment time needed for passport collection. You will need to arrive at the office between 9.00am and 3.45pm.

Let the front counter inspect your pickup form, and you will be given a queue number.

Wait for your number to be called, submit your pickup form to the officer, and you will be required to make payment for your visa. You can either pay by credit card or pay by cash.

After payment made, just wait for a while and your passport will be returned to you with the visa in it. Make a last checking on the visa detail before leaving the CVASC office.


The whole process should take less than 30 minutes from the time you step in Level 6 to the time you step out the office.

Thursday, July 12, 2018

Updated the firmware of my TP-Link RE450 AC1750 WiFi range extender to Build 20171215 Rel. 55534

I just discovered that there is a new version of firmware released on 15 December 2017 and made available for download on 22 December 2017 for my TP-Link RE450 AC1750 WiFi range extender. I should have discovered this earlier!

This is an important firmware update, because it includes the security bug fix for the WPA2 Security (KRACKs) Vulnerability.

Other enhancements and bug fixes in this version of firmware include:

  • Improved online detection method and reduced unnecessary data traffic.
  • Improved the system stability and wireless stability.
  • Fixed the wireless compatibility with Volvo cars.
  • Fixed the wireless compatibility with some wireless network card.
You can download the new firmware update file from TP-Link official website, under the Support > Firmware section.

To update the firmware, unzip the downloaded file, and upload it to your RE450 WiFi range extender by login into the device, and go to System Tools > Firmware Upgrade section.

Your existing configuration in the RE450 will still remain after this firmware update.

After the update, you will see the firmware version changed to 1.0.0 Build 20171215 Rel. 55534.


Wednesday, July 11, 2018

Insecurity in the Internet of Things (IoT)

The Open Web Application Security Project’s (OWASP) List of Top 10 Internet of Things (IoT)Vulnerabilities sums up most of the concerns and attack vectors surrounding the IoT category of devices as below:
  • Insecure web interface
  • Insufficient authentication/authorization
  • Insecure network services
  • Lack of transport encryption
  • Privacy concerns
  • Insecure cloud interface
  • Insecure mobile interface
  • Insufficient security configurability
  • Insecure software/firmware
  • Poor physical security

During a research by Symantec in 2015, they found issues such as the following:
  • Around 19% of all tested mobile apps that are used to control IoT devices did not use Secure Socket Layer (SSL) connections to the cloud
  • None of the analyzed devices provided mutual authentication between the client and the server
  • Some devices offered no enforcement and often no possibility of strong passwords
  • Some IoT cloud interfaces did not support two-factor authentication (2FA)
  • Many IoT services did not have lock-out or delaying measures to protect users’ accounts against brute-force attacks
  • Some devices did not implement protections against account harvesting
  • Many of the IoT cloud platforms included common web application vulnerabilities
  • 10 security issues were found in 15 web portals used to control IoT devices without performing any deep tests. 6 of them were serious issues, allowing unauthorized access to the backend systems.
  • Most of the IoT services did not provide signed or encrypted firmware updates, if updates were provided at all
 
The above information is excerpted from a Symantec white paper regarding the Insecurity in the IoT.
 
 
 

Tuesday, July 10, 2018

My electronic UV light mosquito trap

There has been increased dengue fever cases in my residential area. As a preventive measure, I have bought some electronic ultraviolet light mosquito traps to capture the mosquitoes found in my house.


The body of this mosquito trap is mostly made by plastic, which might be the reason for its cheap price selling at around RM25 only. Anyhow, as long as it works, I am happy with it.

The most important parts of this mosquito trap are its 6 LED lights on top which emit purplish visible light and ultraviolet light which function to attract the mosquitoes to fly to it, and a small fan to suck the mosquitoes down into the trapping chamber.

As you can see from the photo, the trapping chamber can be opened up like a drawer, and you can inspect the amount of insects trapped and died inside, wash it and put it back to the device.

Its fan will generate some noise during operation, not very loud, but still audible at close distance, especially during quiet time. It's suction is not very powerful, so probably can only able to suck in the mosquitoes which flied very near to it, and might not be strong enough to suck in larger insects such as flies, cockroaches, etc.

Now, this question is, does it really work? I really can find dead mosquitoes in the trap. There isn't much mosquito in my house all the while though.



So, it really works! It might not be as effective as those models that use electrocute to kill the insects, but at this price I think is a worth.


Friday, July 6, 2018

ADcase the handphone case with special dampers that can save the phone from dropping damage

ADcase (active damping case) is a very innovative handphone case invented by a German engineering student called Philip Frenzel. It has just won an award from German Mechatronics Society.


The phone case has special shock-absorbers made with metal springs at its 4 corners. In normal situation, the shock-absorbers are hiding inside the case, and the case just looks like other normal handphone cases.

When sensors inside the case detected that the phone is on free fall dropping, it will immediately unfold the metal springs before hitting the ground. In this way, it can effectively protect the phone from damage due to dropping.

After the falling, the dampers can be manually folded back into the case and are therefore reusable.

You can watch the video below to see how ADcase reacts when the phone is dropping.



Very brilliant idea, isn't it?

Thursday, July 5, 2018

WiFi Alliance introduced WiFi Certified WPA3 to replace current WPA2 security standard

WiFi Alliance has just introduced WiFi CERTIFIED WPA3 (Wi-Fi Protected Access version 3) as the next generation WiFi security standard, bringing new capabilities to enhance WiFi protections in both personal and enterprise wireless networks.


Key capabilities of WPA3 include:
  • WPA3-Personal: more resilient, password-based authentication even when users choose passwords that is simple to remember. WPA3 will leverage on Simultaneous Authentication of Equals (SAE), which is a secure key establishment protocol between devices, to provide stronger protections for users against password guessing attempts by third parties.
  • WPA3-Enterprise: offers the equivalent of 192-bit cryptographic strength, providing additional protections for networks transmitting sensitive data, such as government or finance. The 192-bit security suite ensures a consistent combination of cryptographic tools are deployed across WPA3 networks.
With the evolution of WiFi security from current WPA2 to WPA3, we can expect:
  • WiFi password to be a lot more difficult to crack.
  • WiFi CERTIFIED Easy Connect - IoT devices can connect to WiFi network more easily.
  • WiFi data sniffed and recorded without knowing your password will not be able to decrypt even if your password is obtained later.
  • WiFi CERTIFIED Enhanced Open - communication in open connection (WiFi connection without the need of any password) will also be encrypted, therefore much more secured than WPA2 open connection. In current WPA2, if the WiFi is connected using open connection without the need of password, the communication between the WiFi connected device and access point is not encrypted.
  • Stronger WiFi encryption by replacing the existing PSK (Pre-Shared Key) system in WPA2 with the new SAE system.
Anyhow, in order to enjoy the benefits of using WiFi WPA3, both the access point (or wireless router) and the connecting device must support this new WiFi security standard. Devices that support WPA3 will probably hitting the market from year 2019 onwards and gradually replacing the existing which only support up to WPA2.



Friday, June 29, 2018

My Dell DA300 6-in-1 USB-C mobile adapter

My Dell Inspiron 5370 laptop has limited output ports as a trade-off for its slim and lightweight design. It only has 1 USB 3.1 Gen 1 (Type-C) port with Power Delivery/DisplayPort, 1 HDMI 1.4b port and 1 combo audio port.

This means that it can only connect to the network using WiFi connection, as there is no Ethernet port. It is also not able to output its display to projector using VGA connector unless making use of an adapter to convert its HDMI output to VGA.

Luckily, Dell has made available a DA300 6-in-1 USB-C mobile adapter which is able to convert the USB-C port of the laptop into:

  • HDMI 2.0 port that supports 4K display output
  • DisplayPort (DP) 1.4 that supports 4K display output
  • VGA port that supports 1080p full HD display output
  • Ethernet network port that supports MAC address pass-through, PXE Boot, and Wake-On-LAN
  • USB-A port with up to 10 Gbps data transfer speed
  • USB-C port with up to 10 Gbps data transfer speed

This Dell DA300 mobile adapter is plug-and-play on supported Windows 10 computer. It can be used straightaway without the need to install any driver.

It offers seamless video, network, and data connectivity, in a neat, compact design. It price of around RM300 is quite reasonable for its 6-in-1 functions and its innovative design.

Wednesday, June 27, 2018

About the Cyber Kill Chain

The Cyber Kill Chain introduced by Lockheed Martin is a cybersecurity model to describe, in general, how a computer intrusion (hacking) through IT network is carried out in 7 distinguished stages. It was developed based on military attack kind of thought.

Anyhow, there is no common SOP in cyber-attack, and hackers are not necessary following the Cyber Kill Chain of planning and action in their attacks.

This model is however useful to plan for cyber-defense strategy and measure, and also for cyber-threat analysis to a networked computer system.

The 7 stages in Cyber Kill Chain are:

  • Reconnaissance - the victim is observed, analyzed and studied by the attacker.
  • Weaponization - tools are developed or obtained to exploit the weaknesses found in the victim.
  • Delivery - the "weapon" is deployed to the targeted victim.
  • Exploitation - once the "weapon" is successfully deployed, it will start working by looking for vulnerabilities in the victim's computer system.
  • Installation - at the stage, access is silently obtained by the "weapon". It will find it way to communicate to the attacker using the computer network. Normally, a backdoor is established to enable such linkage.
  • Command and Control - remote access to the victim's computer system is made available to the attacker. The attacker can take over control of the compromized system and issue command to it.
  • Actions on Objectives - with the control, the attacker is able to proceed with the objectives of the attack, such as data exfiltration, data destruction, data encryption for ransom, etc.



With reference to this model, the defending party can plan for countering the attack by the famous 4 Fs strategy, namely:
  • Find the enemy
  • Fix the enemy
  • Fight the enemy
  • Finish the enemy

Hint: Click on the "Older Posts" link to continue reading, or click here for a listing of all my past 3 months articles.