Skip to main content


Showing posts from 2007

High-speed wireless video transfers 100X faster than WiFi

IBM is looking to change the way you watch video. The company today is announcing microprocessor chipsets that can wirelessly transmit high-definition video between computers, televisions and handheld devices in the time it takes to push the Play button.
IBM will do this by teaming with MediaTek to launch a joint initiative to develop these ultra fast chipsets that will let users rid their homes and offices of the cumbersome wires needed to connect their HD-TVs to set top boxes and or other devices. The companies will be developing millimeter wave (mmWave) radio technology -- the highest frequency portion of the radio spectrum -- 60 gigahertz rather than 2.4 gigahertz -- and digital chipsets that enable at least 100 times higher data rates than current Wi-Fi standards, IBM said in a release.
Users could upload a 10 gigabyte file in five seconds with the new technology versus 10 minutes using current Wi-Fi technology. mmWave wireless technology can be widely used at home and offic…

Keep your mail servers off blacklisting sites

Keep your mail servers off blacklisting sites and avoid being flagged as spam!
by Moonshi Mohsenruddin, CEO CommGate, Inc.

Greetings! This blog will be shared by my fellow team mates - Mr. Tan Hock Chye, Technical Manager, Mr. Ramesh Raman, Chief Technology Officer and Mr. Abhik Biswas, Chief Marketing Officer of CommGate. We will be posting alternately, in attempt to bring mind blowing technology thoughts to you on a regular basis. If you would like to read more about who we are and what we do, please do check out our profile on our corporate website.

These days, it seems like every other email servers/hosts are tightening the screws on their email servers just a little bit more in order to battle against spam and viruses. Generally speaking, having more servers out there tightening their security and policies is a good thing. However, if you do not follow some basic precautions on your own email server(s), valid email from your hosted email domains may start to be flagged as spam, ret…

Difference Between Gelato and Ice-cream

COMMON QUESTIONS ASKED - Is there really a difference between gelato and ice cream?
by Aida See, Owner of Frutta la Viva -

The ONE question that many has asked. Is there a difference between Gelato and Ice-cream? To many of us, it is a question that we want to find out the answer but have not met an expert that could provide the advice. So here is the truth, the ultimate truth and nothing else but the truth!

The answer to the question is....

Definitely! The difference are:

Two basic differences that distinguish Italian gelato from ice cream are the fat and air.Gelato is comprised of 90% milk, as opposed to the 50/50 mix of milk and cream in most ice cream.
Gelato is made with more milk and less cream, so there’s less butterfat. Generally gelato has less than 8% butterfat, as compared to ice cream which has more than 18% butterfat.Less fat content does not make gelato any less tasty. On the contrary, the gelato becomes less s…

Is Cancer a death sentence?

Is Cancer a death sentence?
By Stephen Mok, Financial Consultant, IPP Financial Advisers Pte Ltd

Within a short span of 6 months, 2 female relatives of mine had been diagnosed with cancer. Both are in their early sixties. One had cancer of the womb and the other had bone cancer.

The first one was a simple factory worker, staying in a 3-room flat while the second was a multi-millionaire business woman, staying in District 9. Both were expected to live for a few months as they were at the fourth stage of cancer. They did not detect the cancer cells earlier due to ignorance and refused to go for medical checkups.

1) The first relative was warded at Kandang Kerbau Women and Children’s Hospital (a government restructured hospital) and underwent chemotherapy after the doctors confirmed the presence of the cancer cells. She went in and out of the hospital many times for check ups, scans, medication and counseling.

Unfortunately she suffered a stroke after a week of chemotherapy and became bedridd…

Pfizer PCs hijacked - to send Viagra spam

As most of us have known today, Viagra is manufactured by Pfizer U.S. Pharmaceuticals and it is the most widely used spam. Now, can you imagine if your business computers are compromised by black-hat hackers to send out Viagra spam?

Here you are - a business owner operating a growing small-medium business and have become a trusted adviser to your clients. Now, imagine this - you did not continuously invest to upgrade and protect your network computers and diligently get someone to make sure that your network is secure and IT Security policies are being practiced by all your staff. Your last network firewall purchased was 3-years ago and all your PCs are installed with an anti-virus software.

After being called by your Internet Service Provider, you realized that several of your PCs has malicious software which was silently installed without the PC users even knowing. Now, what are you going to do about this?

After you ponder about it for several minutes, read this story from ComputerWor…

How to reset Windows XP password

Some of you might have come across problems with your Microsoft Windows XP computers where you knew you have typed your password correct but the PC refused to log you in.

When this happens, it is due to the fact that your password file or registry could have been corrupted.

To resolve this problem, you can refer to this few guides;
How to Hack Into a Windows XP Computer Without Changing Password by RaymondHacking Windows XP from the Experts by McGraw-HillsHacking XP password by Hack in the Box
Have fun!

Want to be a Spider-Man? Soon, you can...

A "Spider-man" suit that enables its wearer to scale vertical walls like the comic and movie superhero could one day be a reality, according to a study.

So, you want to be a Spider-Man huh? Very soon you can - thanks to the Spider-man' suit secret which was recently revealed. Natural technology used by spiders and geckos could help a human climb the side of a building or hang upside down from a roof, the analysis suggests. The findings are published in the Journal of Physics: Condensed Matter.

For details go to

Contextual Thinking

Contextual Thinking: The Key to Success in Communicating Innovation Proposals
by Hector Ramos, COE Partners

You may have heard and read much in the last few years regarding creativity and innovation.. Or you may even have attended a creativity workshop that you found interesting, fun and helped you come up with some new ideas. Now your current employer may be requiring innovative input. However, you find that your suggestions are mostly ignored or frowned upon. This is mainly because nobody has told you the ‘thesecret’.

In the case of creativity and innovation, not only do managers have different ideas of what they mean, but they find it difficult to express them in a consistent manner. This results in resorting to clich├ęs such as out-of-the box thinking, or ideas producing bottom-line results. If there is such a variety in opinion, what can you do as a potential or current employee to provide the required creative and innovation input?


How To Gain Power and Attraction

By Hanzo Ng, Sales Ninja Group

POWER. Some have it, some don't have it. Some crave for it, some lose it. defines power as the ability to act, to accomplish something; in short, the possession of control or command over others. Throughout history, people are attracted to powerful people.

Power comes in many forms; in our cavemen days, power is the ability to hunt, to bring food back to the tribe. When the Roman Empire ruled the land, the senator with the most connections was seen as powerful. These days, a combination of social status - the car we drive and the money we have - signify our power.

So is power reserved for the few privileged ones or can an average Joe exude a great sense of power? Is power in-born, acquired or can it be developed?

What is the structure of power? Why do some people get respected more often and attracts tonnes of business opportunities, better jobs, better prospects, better women or men to their lives while the others don't? How do we…

Problems logging on to Skype

Many of you may have difficulties in logging on to Skype this week. After checking with Skype, I was told that Skype is facing technical glitches and the Skype engineering team has determined that it’s a software issue. They expect this to be resolved within 12 to 24 hours.

Meanwhile, you can simply leave your Skype client running and as soon as the issue is resolved, you will be logged in. Skype have apologize for the inconvenience and has downloads of Skype software have been temporarily disabled. They have promised to make the downloads available again as quickly as possible after they fixed their glitch.

So there you go. Do not rely on 1 communication channel if you rely on VoIP for your business or to make important personal calls. Diversify and put your eggs in several baskets :)

You can contact me via Skype, MSN and GoogleTalk.

What Makes a Champion?

By NG Chang Siang, Education Success Coach
MindChamps Holdings Ltd

‘’ What makes a champion is a champion mindset. The champion mindset is the transferable commodity, not the skill itself. If you have done something great in one field, you are far more likely to do it in another ‘’ --Professor Allan Snyder FRS
I have a good friend who is a primary school teacher. He also takes on as a role of a coach in flaw ball for the students in his school. Guess what? He never play flaw ball before. Not even that, after he coached his students, they won a school team which was coached by a national flawball player.

That day I met him in our soccer game as we play soccer together every Monday. He played soccer very well and represented his schools when he was very young. I ask him : “ How did you do it…?” “ How can someone with no flaw-ball playing experience train and beat another team whom has an experience coach?”

He replied: “ Oh, I just use the strategy I know in playing soccer and apply to t…
Are You Adequately Insured?
By Stephen Mok, Financial Consultant
IPP Financial Advisers Pte Ltd

My friend called me today to tell me that one of his friends had a motorcycle accident sometime back. He fell off his motorcycle and injured his head seriously. Fortunately he survived the accident but unfortunately, he lost his memory!!!

Now he is recuperating at a community hospital in Ang Mo Kio (Singapore) as he cannot stay too long at Tan Tock Seng Hospital, which is a restructured hospital.

As the sole bread winner of his family with two kids, he is now unable to support them. Who knows how long he will need to stay in the community hospital.

As an independent financial adviser, immediately the issue of insurance payout and the survival of his family sprung into my thoughts....

1) Will his Private Medishield plan pay for all his hospital bills?

2) Will his Life Insurance Critical Illness Policy pay a lump sum of money for his medical related expenses outside the hospital?

3) How long will hi…
OpenProj - FREE alternative to Microsoft Project

I wanted to share with all of you about Projity's important announcement last week at LinuxWorld.

Projity announced the release of OpenProj, a FREE (yeah, another FREE software) and open source replacement of Microsoft Project. OpenProj is available on Windows, Linux, Unix or Mac and is interoperable with Microsoft Project.

The best thing is, it even opens existing MS Project files! How cool is that? I read on OpenProj website that OpenProj has been downloaded on an average every 35 seconds around the clock at since they launched and made the software available last week.

OpenProj is now in the 99.99th percentile for activity on and is quickly becoming one of the most used open source solutions worldwide. The OpenProj folks are expecting about 11 million worldwide users and in my opinion, this has been an excellent start for them.

MS Project has been a key strategic solution for Microsoft w…
E-mail Still a Threat even though Attachments are Less Dangerous

Not everyone of us enjoy the “pleasure” of observing the tendencies of hackers, crackers and other bad Internet folks with good computers security skills on a daily basis. It may not be apparent that this is a constantly and rapidly evolving Internet world, with the bad computer folks one step away from the good. Moreover, whether the good guys or bad are out front, shifts from day to day.

Until not long ago, the common way in which Internet viruses and worms were distributed was through contaminated attachments in e-mail. For years, people were told not to click on these attachments unless they trust the source of the email and is expecting that attachment or they have scanned it with an anti-virus software. The message finally began to get through- years later and hackers had a problem. That’s good news, of course. But crackers are a resilient bunch, and their solution was to send spam with links seeking to get people to…
Back up like an expert with rsync on Linux
This article is by Joe 'Zonker' Brockmeier on July 17, 2007 (9:00:00 AM)
Original article published at

In the last two months I've been traveling a lot. During the same period my main desktop computer went belly up. I would have been in trouble without rsync at my disposal -- but thanks to my regular use of this utility, my data (or most of it, anyway) was already copied offsite just waiting to be used. It takes a little time to become familiar with rsync, but once you are, you should be able to handle most of your backup needs with just a short script. What's so great about rsync? First, it's designed to speed up file transfer by copying the differences between two files rather than copying an entire file every time. For example, when I'm writing this article, I can make a copy via rsync now and then another copy later. The second (and third, fourth, fifth, etc.) tim…
A Simple Backup Script on Linux

Everyone whom uses Linux wants to implement a backup solution for their Linux servers. After a lot of research, I finally decided to implement a script-based backup making use of TAR, GZIP, and CROND based on Jason Pepas's backup script.

Step 1: Login to your Linux server as user "root" and type this command

mkdir /root/scripts

Step 2: Decide on what device you want to use as a storage for all the backups. For this scenario, I use a 30GB SCSI HDD plug to my Linux server. Then, I reboot my server to find the device name and edit my /etc/fstab file to add the storage device so that it is automatically mounted every time the server is rebooted. To find out the device name, type dmesg. In my case, the SCSI HDD is /dev/sdb2

vi /etc/fstab

LABEL=/dev/sdb2 /backup ext3 defaults 1 2
LABEL=/ / ext3 defaults 1 1
LABEL=/boot1 /boot ext3 defaults 1 2
none /dev/pts devpts gid=5,mode=620 0 0
Optimizing the Solaris Network Cache and Accelerator for the Apache Web ServerI met an old friend whom was complaining that one of his Solaris servers at work which run the Apache web server is very slow. He has added RAM and migrated from RAID-5 to RAID-0 to improve disk I/O but the problem still persists. He asked me if I have any tips to offer as I had some Solaris experience several years ago. Googling on my personal file-server, I saw a tip I kept since year 2004. Since it could be useful to more people, I decided to share it on my blog.
Note: This tip offers an optimized configuration for dedicated web servers running Apache Web Server on a Solaris Operating System. This document is a brief how-to on configuring and optimizing the Solaris Network Cache and Accelerator (SNCA). RequirementsSolaris 2.8 OS256MB RAMApache Web Server 1.3.xNecessary Packages for the Solaris OS 32 bits: SUNWncar
64 bits: SUNWncarx
1. As a start, edit the file /etc/nca/ncakmod.conf and…
We are Being Watched!
One thing you may have forgot is that Windows computers keeps files called index.dat. Unless you are a advanced user, like the advanced Nokia hacker, you cannot easily delete these files. These files are used by Windows Explorer as a database which runs as long as Windows is active. This file stores all of your search queries, web sites you visited, autocomplete, Internet Explorer history, cache, cookies, and recently opened files. These files remain even after a restart, and also after you clear any of your histories! These index.dat files can be use to recover what you opened, what you looked up, and what you typed into forms even if you think you have it erased.
Why are these files there?
Well, some people might say convenience and speed. But why does windows lock these files, and why is it so hard to delete them? Why are they hidden from the system? Everything is passed off as a feature to better help you live, but its true nature may be to invade your privacy.
Howto Deploy Ethernet MAC Address Filtering on CommGate 3.x
Download Notepad++ from to edit the following text files from a Windows PC. You can then convert the text files into Windows and UNIX modes easily. Using Notepad++, create a text file and save it as rc.firewall.macaddr in /etc/rc.d directory.Add all the Ethernet MAC Addresses into file /etc/rc.d/rc.firewall.macaddr (one MAC Address per line) to filter it via the firewall rules in the following format; MACADDRS="\
11:22:33:44:55:66 \
aa:bb:cc:dd:ee:ff \

Note: Please change the MAC addresses with your own.
Using WinSCP3 (downloadable from, login to the CommGate 3.x system as user root and double-click on the following file /etc/rc.d/rc.firewall.local(Note: Save a copy of the original file for backup purposes before you edit it as a precaution).Add the customize rules to filter Ethernet MAC Address o…