j-j.co.za
Sharing thoughts and ideas on business, security and photographyBlackberry Bold 9000 battery replacement (and cheap chinese shipping)
Posted on July 23, 2010I really enjoy my Blackberry Bold 9000. It has a nice sized screen and a great sized keyboard. I also use a Nokia E71, and in comparison the small little keyboard is a real pain to type on. Over the 14 months or so I have had it, the battery life has deteriorated significantly, to the point where I can’t get through a day of normal useage (perhaps an hour of calls, some twitter useage, some BBM conversations and fairly heavy email useage).
I read a little about double capacity batteries being available, did some searching around and found one at a very reasonable price on Ebay, with a new back cover to allow the battery to fit. About $10 later (free shipping), a two week wait and it appeared in my post box. Plugged it in tonight. The new case makes the phone a bit bulkier than it already was (not so great), although not quite as heavy. I had thought the extended battery case would give a bulge at the back, instead it extends the size of the entire back of the phone. Still having doubts about whether this is going to be convenient, but, if it really does give double (of the original) battery life, I think I am going to enjoy this.
Will keep you all posted.
P.S. Has anybody figured out how the sellers in Hong Kong and China seem to be able to offer free shipping on small purchases as low as $1? I have serious doubts if we could even post them anything for $1 let alone buy the packaging and the actual item for sale. This is fun new retail therapy (for me), and a completely new way of doing business to ponder. If people have time to spare there is no reason to buy these kinds of items locally. Let’s see if the screen protectors, pouches, camera batteries and lense covers arrive too 🙂
P.P.S. I bought the battery with cover from soonhua_digital on ebay (US)
Presentation to UKZN MBA class on Security and Ethics
Posted on July 23, 2010I’ll be doing a presentation to the University of KZN MBA class on “Security and Ethics” on Tuesday 27th July at 7pm at the Graduate School of Business Lecture theatre 1, Westville Campus.
I have presented on a similar topic for the last 3 years, and have thoroughly enjoyed the hour or so spent with the class on each occasion. The presentation has generally encouraged some lively discussion and some intelligent questions and discussions. I’ll put up a copy of the presentation on the website sometime after Tuesday (probably next weekend).
Anyone interested in attending (who isn’t already part of the class :), drop me a note and we can arrange something.
Optimising Audit Command Language (ACL) Coding
Posted on July 06, 2010I was working with a colleague the other day on trying to debug some Audit Command Language (ACL) code that was doing an interest recalculation for a moderate sized dataset of some 1.7 million records. The recalculation was taking some time to perform, running at around 70 minutes for the calculation. We were getting significant errors in our results and were quite frustrated. We had taken a small sample of records (12 months for two accounts) and had done some “manual” recalculations in Excel so we could see our code was producing the same results on the test check, but we were getting much bigger differences on the full record set.
Debugging was just getting really frustrating given that it was taking over an hour after each change to see whether the difference was sufficiently reduced to give a number that wasn’t material.
After working on the code for a morning, I decided that there had to be a better way to do this, so we started doing some rough profiling of the ACL code. Looking through it, there were a number of duplicated calculations and a number of duplicated recordoffset reads. We spent some time assigning these to calculated variables to reduce the numbers of reads and recalculations. It didn’t make much difference, shaving a few minutes off the overall time.
We looked at our hardware, a Dell E6400 laptop with a high speed SSD connected via eSata. We tried running the data calculations off the lower speed internal drive, and found that it was running at the same speed, which was somewhat worrying. At this point we also realised that a simple summing of the data was taking less than 15 seconds to read all the records and produce a total, so something (other than the data reads) was causing the huge slowdown.
We started hacking our code to pieces (ignoring the interest calculation part for now) and discovered that the calculations weren’t causing much of the overhead, the only thing that reduced the times was removing the recordoffset commands. Removing these commands reduced the times by a factor of 100+.
Now we realised that the code would have to be rewritten, almost from scratch. It took about an hour to recode the calculations into Group by statements, and boy what a difference. The first run through of the new code took a mere 26 seconds. Sure the calculations were way out, but debugging code that runs so much quicker is a hang of a lot easier.
A couple of hours later and the code was now correctly calculating the interest to within materiality.
What we learned :Â The recordoffset in ACL seems to be terribly slow and should be avoided for anything but the smallest datasets. Rather invest the time and write the code using the Group by commands. The speed increases are more than significant and in the longer run will reward you handsomely.
The other little catch, don’t forget that it’s not only numbers that get type cast in your initial assignment, it’s also strings. So, using : Assign previousinterestrate=0.00000 ensures that your interest rate will use five decimals rather than chop it to an integer if you used assign previousinterestrate=0
Assign previousaccountnumber=”12345678″ gives you an 8 digit account number whereas previousaccount=”xx” will chop it to just two even if you later assign it to fields containing 8 digit account numbers. That one had us stumped for about an hour where the interest rates and previous transaction dates weren’t resetting when the account numbers changed. After fixing our initial assignment (as above), everything worked like magic.
Hope that helps some avid ACL coders out there to do things a little more efficiently.
The work above was performed with ACL Desktop Edition Version 9.1 found here on the www.acl.com website.
Proposed MSc in Information Security (Rhodes)
Posted on June 19, 2010Barry Irwin from Rhodes University is looking into getting a MSc Infosec (Masters in Applied Computer Science – Focusing on Information Security) up and running, including potentially for part time / distance students. This certainly sounds like a good addition to the formal information security learning options in SA. He has placed a survey online and anyone interested in further information can mail Barry at “b.irwin (at) ru.ac.za”.
Some further info from the survey page about the proposed MSc :
The degree will consist of a combination of Coursework Modules and a Research project and will be run by the Department of Computer Science at Rhodes University. The intended target for the Degree programme is individuals working within the information security field. These individuals should ideally have at least 2-3 years working in information security or associated fields. While primarily targeted at individuals within South Africa, others may be interested, particularly in the one year full time option.
Based on the feedback received from the survey and other market studies, a final feasibility decision will be made. Those wishing to be kept informed of the status of the course can complete the contact details section at the end of the survey or email Barry.
The lurking dangers hidden in .PDF’s
Posted on June 13, 2010A couple of days ago there was some noise around some nasty payloads being delivered through .PDF’s. So just in-case you thought that opening a PDF file was safe, take a read of the blog post that Z0nbi put together on the actions of a spam PDF that he received :
” Today I was trawling through my Gmail spam folder like a good little mail monkey when I came across a rather strange bit of spam. Usually you just get rubbish about making your manhood the size of a small country or the latest twitter/gmail support/facebook AV malware. Most of the time I just ignore the messages due to them being very boring and not really worth a coffee and a few hours in Terminal…Today’s message was a little different. It was a very simple email with the subject line “New Resume” and one line in the body of the email saying “Please review my CV, Thank You!“. So, seeing as I have NO idea who the sender was and that there are no issues with the PDF format that I know of, I saved the PDF document to my desktop as I had a virtual machine I just knew the PDF would love immediately. ”
ISG (Whitehat) Durban June meeting : Information Warfare
Posted on June 13, 2010The details for the next ISG Durban (White Hat) meeting :
Title: Information Warfare
Speaker: Brett van Niekerk
Date: 17 June 2010
Time: 18:30
Venue: Elephant Room, M Block, UKZN Westville Campus
If you have any problems or need help getting to the venue, email ralfepoisson@gmail.com or drop me a mail and I will provide you with whatever details you need.
To get to the Elephant Room, first follow the map to get to M block, then go through the door to the right, in front of you there will be the access the LANs (light blue turnstiles and a door), the door will be open, go through and listen for the voices 🙂
Reminder : ISACA KZN Chapter meeting 17th June
Posted on June 13, 2010Region: Durban, KZN
Date: 17 June 2010
Time: 2:30pm for 3pm
Topic : Compliance Services (Financial Risk Management) will be presenting: “Privacy – Protection of Personal Information”
Importing NMAP .xml output into MS Access part 2
Posted on June 13, 2010As in the previous post, our initial NMAP scan produced an XML file over 600mb in size. To finish the scans we split the remaining ip ranges into more manageable chunks and ended up with another 20+ xml files of around 50mb each.
Running all of these through Exult XML to get a single consolidated access database was a bit problematic. The tool didn’t have the functionality to add additional scans to our original database, so all of the XML files had to be selected together and run through the tool to produce a single database. The conversion ran for 24hrs without completing so we had to come up with a better plan. Initially we considered running the conversion on a more powerful machine with much faster disk, but when trying to install the tool discovered the license key wouldn’t work. It used some (undisclosed) technique to ensure single install only. An email off to the developers and they sent us a new key (about 6 hours later – thanks to time differences, not any delay on their part). In the meantime plan B was in place.
Looking through the raw XML files I saw that the vast majority of the IP’s were non responsive and those few lines indicating this were taking up an awful lot of space when looked at collectively. A quick search and replace to remove these lines and the XML files were reduced to about 1/20th of their original size. With the new reduced file sizes Exult happily produced our Access database in less than half an hour and we were ready to continue with the exercise. The old sayings about better planning and new strategies certainly applied here.
Using access we were then able to produce great summary reports to pull out details on top active ports, numbers of machines in each class, active IP ranges etc etc. Next step choose our samples for more detailed scanning.
Exclus1ves.co.za the bad and the slightly better (updated)
Posted on June 03, 2010Three weeks ago (20 days to be exact) I ordered the Blu-ray version of The Lord of the Rings trilogy from Exclusive Books online store. I had been given a gift voucher by ITWeb for talking at their Infosec conference so thought it would be a good way to spend it.
The online process was reasonably painless, I was signed up with a new account linked to my Fanat1cs card. I went to check out, was prompted that I had a R50 discount voucher from Fanat1cs (which I didn’t know about – nice bonus), and chose the option to deliver it to my local bookstore for collection. Nowhere in the process could I use my paper based gift vouchers. What a pity. Still, with the decent price and R50 off I placed the order anyway with a notice that I could expect delivery in 8-10 days. Great.
8 Days later I was in the local exclusive bookstore so visited to found out the status of my order. #fail. The store has no way of tracking my order and could only tell me to check online or call the call centre. mmm.
I went online, found my order, the status was useless. It told me the status was “confirmation”. Great. There was a button to “send a message” to customer service. Perfect, clicked that sent a message, 2 days later I hadn’t heard from them so called. Item was out of stock, I would definitely get it next week (being this week). This morning I went online, checked status, same status. Clicked on “send message” – heard nothing. This afternoon I called them around 4:15.
Sorry sir, our warehouse is closed, we can’t help you. Great. What happened to the message I sent online I asked? “We get too many messages online, we can’t possibly respond to them all, its better you phone us.” I see red. Why have the #@%@$$ button if that is the attitude. I asked if they had a customer services manager, they do. Can I speak to him? No, sorry, he is in a meeting. Mmmm, where have I heard that before. Anyhow, his name and number was promptly supplied. He was out of the meeting at 4:30 I was told. Called at 4:40, he answered 🙂
I spoke to the man, he was very apologetic, seemed appalled to hear the story, and what the staff in-store and on the call centre were telling me. He offered me a further discount on my purchase, promised to call me tomorrow to explain the whereabouts of my purchase, and explained the site was still being developed further to remove the teething troubles. In my eyes he redeemed the situation (slightly) and if he follows through I will order from them again. If he doesn’t, they won’t be getting any more business. I certainly haven’t had these kinds of problems from Take2.co.za or Kalahari.net. Amazing how the “big guys” can get on-line so wrong. Here is hoping they can turn it around and get things working properly. I really want to order Avatar Blu-ray and Fifa worldcup soccer for PS3. Their prices are good. Come through and you can have the business.
Update:
I received a mail this afternoon from Exclus1ves. They are now promising me that I can have it in another 11 days time (its been 21 days, and the original order said 10 days).
The mail tried to console me by telling me no retailers have stock (strange I have seen it at Look & Listen in the Pav a few times), and that if they can’t deliver they will give me a full refund (by then having had my money for 6 weeks). mmmm. I’m back to being less than impressed. Honesty I appreciate, but treating the customer like a fool?
Importing NMAP .xml output into MS Access
Posted on June 03, 2010Over the last few days we ran a really large discovery scan on a client’s network. The scan was discontinued part of the way through and at that stage had produced a 650Mb .xml file. Smaller files are easy to load into Excel or Firefox to view and work with. With this much data we needed a more workable solution.
The first though was to import it into MS Access 2007. Access has built in import filters, easy enough we though. Two error lines in a table and no data brought an end to that hopeful idea. A little bit of googling found as a tool that promised to do pain free importing of XML into access, building the table structures on the fly and automatically creating the necessary table links.
The Exult XML converter from novixys.com was a lifesaver.We downloaded the trial, tested it on a scan of the local class C and it worked wonders, creating all the required tables and links. $105 later on the credit card and the full version was purchased.
Using it on out full scan file was a little trickier. Since we aborted the scan the .xml file hadn’t been properly completed. Exult didn’t like the incomplete file so threw out an error message and refused to build the access database. A comparison of the short test scan and the full scan revealed the missing XML tags. We copied and pasted these over to the full file, updating the scan information manually, and saved the file. Running Exult again took a while (over an hour) but produced the required file. Perfect solution.
Thanks Novixsys.
We are scanning the rest of the network as we speak. Not sure how we will import the balance of the .xml files into the same database. Hopefully Exult can do that for us too. Will find out soon enough 🙂
A place at the table : Giving consumers a voice in the marketplace
Posted on May 30, 2010Host : Paul Crankshaw – Editor of National Consumer Forum’s newspaper Consumer Fair
Date : Wednesday 2nd June 2010
Time : 07h40 for 08h00 until 10h00
Venue : Hellenic Community Centre, 6 High Grove Road, Umgeni Park, Durban North
Cost : R285 per person
Booking is essential, contact Ms Debbie Main on 031 260 1627 or maind1@ukzn.ac.za
Apart from tightening controls on undesirable business practices that prejudice consumers, the Consumer Protection Act also aims to “promote consumer participation in decision-making processes concerning the marketplace and the interests of consumers”. For South Africa, this strengthens the fourth dimensions to the traditional tripartite approach to planning and implementing policies, promises to bring long-overdue focus (and perhaps even more resources) to the country’s depleted consumer movement.
The presentation will focus on how business and government will need to reconsider the way they see, and engage with, consumer groups at a strategic and operational level.
Tech4Africa conference 2010
Posted on May 28, 2010I just came across the website and speaker lineup for Tech4Africa. TECH4AFRICA is a web & emerging technology conference, bringing global perspective to the African context. It looks as though it will be a really great conference.
The schedule and speaker lineup are on the website.
The conference takes place in Johannesburg on the 12th and 13th August 2010 at The Forum in Bryanston, Johannesburg. Directions, map etc are available on the website.
The website is a great example of how to promote a conference using new media. Wonderful to see a tech conference really using the tech available.
ZaCon II Call For Papers
Posted on May 28, 2010Date : 9 October 2010.
Location : University of Joburg. Joburg.
Cost : The goal is to hit breakeven on the costs, so an entry fee (if charged) will be low.
Many other conferences exist to cater either to the strictly Academic or Professional individual. We want a simple community based forum that is completely free of corporate affiliation (or shilling). The intention behind this is that the passion for the field or of sharing knowledge should be the primary motivation of attending or speaking at this conference.
We aim to fulfill these objectives:
* Provide a platform for publication of infosec research
* Showcase free locally-developed infosec tools
* Support the interaction of industry, academia and the interested public
* Encourage discussion on infosec / hackery / sec-related-geekery at large
* Build the ZA infosec community
* Provide a platform to up-n-coming talent
Closing date for submissions is 20 August 2010.
Contacts
* Site: http://zacon.org.za
* Abstracts: abstracts AT zacon org za
* Organisers: people AT zacon org za
* IRC: #zacon on irc.atrum.org
What people say
Close block