Aspirasi (pro-university) supporters —> Malaysia no future

28 01 2010

GEORGE TOWN: A police report has been lodged over a disturbance at a student election rally in Universiti Sains Malaysia (USM) on Tuesday night.

A scuffle took place on university grounds during a campus election public speaking rally when a young man approached a group of students carrying Pro Mahasiswa banners.

A video of the incident, which has been circulating over the Internet, shows the man dressed in a white t-shirt and black jacket confronting the group with a pink box cutter.

No one was injured in the incident, but a Pro Mahasiswa banner was slashed.

George Town acting OCPD Supt Gan Kong Meng said a police report had been lodged on Wednesday by two undergraduates and the case had classified as mischief under Section 426 of the Penal Code.

Suaram Penang condemned the incident and urged USM authorities to conduct an investigation.

“We find this violent assault on campus democracy horrifying.

“What should have been a peaceful campaign rally for candidates to compete on ideas instead turned into an arena for bullying and violence to take place,” said Suaram Penang branch coordinator Ong Jing Cheng in a statement that was endorsed by 13 other non-governmental and student groups.

In a press conference Thursday, USM acting vice-chancellor Prof Omar Osman said the university would leave investigations to the police but an internal inquiry would be conducted on the Safety Department which was “sluggish” in its response to the incident.

“Normally, when a police report is lodged, the university will step aside to prevent double jeopardy. However, we will do an internal investigation on how the Safety Department reacted to the incident.”

Omar, who was visiting a polling centre at USM’s main campus here, said voting had been conducted without any other untoward incident.

Voter turnout, however was low at 12 noon with approximately 30% of students showing up to vote at the main campus and 50% in USM’s Health Sciences medical campus in Kubang Kerian, Kelantan.

No voting was conducted in USM’s engineering campus in Nibong Tebal as all six faculty seats and one general seat there had been won uncontested.

Out of the total of 31 faculty and eight general seats that were up for grabs, 23 faculty seats (14 in the main campus, six in the engineering campus in Nibung Tebal and three in the medical campus) and one general seat in the engineering campus were won uncontested.

Results for the remaining eight faculty seats and seven general seats are expected at 11.30pm Thrusday.

Bill Gates also using Twitter !

28 01 2010

Want to follow Bill Gates ? Or…..wanna kidnap him somewhere?

Follow him from now…..

Google China ( hacked by China hackers

27 01 2010

Google threatens to quit China after cyber attacks.

Previously, when you go to (Google China website), there are a lot of websites and info that the China government asked to block. Now, you can easily found in

Let say, you search in—> massacre tiananmen square

Everyone in China can only search in (with the “cn” at the end) because the China government want to control the media. Especially those highly sensitive things such as this massacre.

Those pictures of students killed by the China army in 1989 are not supposed to show in the image search.

The Making Of Avatar – What are the software used

25 01 2010

[iframe 640 385 ]

Avatar has captured the imagination of millions of people from around the globe. Creating a completely new world from scratch, one with hundreds of species of flora and fauna and breathtaking landscapes is a daunting task that Cameron completed with flying colors.

Let’s see what companies and software were involved.

  • Autodesk Maya
  • Pixar Renderman for Maya
  • Autodesk SoftImage XSI
  • Luxology Modo (model design, e.g. the Scorpion)
  • ZBrush (creature design)
  • Auodesk 3ds max (space shots, control room screens and HUD renderings)
  • Autodesk MotionBuilder (for real-time 3d visualisations)
  • The Foundry Nuke Compositor (image compositing)
  • Autodesk Smoke (color correction)
  • Autodesk Combustion (compositing)
  • Massive (vegetation simulation)
  • Mudbox (floating mountains)
  • Avid(video editing)
  • Adobe After Effects (compositing, real-ime visualizations)
  • PF Track (motion tracking, background replacement)
  • Adobe Illustrator (HUD and screens layout)
  • Adobe Photoshop (concept art, textures)
  • Adobe Premiere (proofing, rough compositing with AE)
  • many tools developed in-house
  • countless plugins for each platform, some of them Ocula for Nuke, Ktakatoa for 3ds max, Sapphire for Combustion/AE.

Avatar: Interview with James Cameron

25 01 2010

Avatar director James Cameron talks to Discovery News’ Jorge Ribas about his new science fiction epic, and the technology he needed to get it on the screen.

Churchill Club : What's Next with the Internet

25 01 2010

A Honeymoon on a Tropical Island off the Borneo Coast

24 01 2010

If you are contemplating a honeymoon on a remote paradise not too far from civilization, maybe a good spot to consider would be the Sipadan Water Village Resort on Mabul Island.  The facilities are superb and up to par.

What can you do there? You can swim, snorkel, dive or simply bask in the sun and gaze at the horizon!

Contact if you have any further enquiries and they will endeavour to arrange a package that will suit you.

Dr M: If they can make Avatar, they can make 9/11

23 01 2010

After James Cameron’s sci-fi blockbuster ‘Avatar’, former premier Dr Mahathir Mohamad is now having second thoughts about the attacks on the World Trade Centre in 2001.

He believes that if the Americans can produce such a movie, with all its technological wizardry, then staging a so-called terrorist attack would not be a difficult task.

How Spammer make money

20 01 2010
People who create electronic spam are called spammers (especially by email)

Spammers are turning a profit despite only getting one response for every 12.5m e-mails they send, finds a study.

By hijacking a working spam network, US researchers have uncovered some of the economics of being a junk mailer. The analysis suggests that such a tiny response rate means a big spam operation can turn over millions of pounds in profit every year. It also suggests that spammers may be susceptible to attacks that make it more costly to send junk mail.

Slim pickings

The spam study was carried out in early 2008 by computer scientists from University of California, Berkeley and UC, San Diego (UCSD). For their month-long study the seven-strong team of computer scientists infiltrated the Storm network that uses hijacked home computers as relays for junk mail. At its height Storm was believed to have more than one million machines under its control.

The team, led by Assistant Professor Stefan Savage from UCSD, took over a chunk of the Storm network to make it easier to run their study. “The best way to measure spam is to be a spammer,” wrote the researchers in a paper describing their work. They created several so-called “proxy bots” that acted as conduits of information between the command and control system for Storm and the hijacked home PCs that actually send out junk mail. The team used these machines to control a total of 75,869 hijacked machines and routed their own fake spam campaigns through them. Two types of fake spam campaign were run through these machines. One mimicked the way Storm spreads using viruses and the other tried to tempt people to visit a fake pharmacy site and buy a herbal remedy to boost their libido.

The fake pharmacy site was made to resemble those run by Storm’s real owners but always returned an error message when potential buyers clicked a button to submit their credit card details. While running their spam campaigns the researchers sent about 469 million junk e-mail messages. The vast majority of these were for the fake pharmacy campaign.

“After 26 days, and almost 350 million e-mail messages, only 28 sales resulted,” wrote the researchers. The response rate for this campaign was less than 0.00001%. This is far below the average of 2.15% reported by legitimate direct mail organisations. “Taken together, these conversions would have resulted in revenues of $2,731.88—a bit over $100 a day for the measurement period,” said the researchers. Scaling this up to the full Storm network the researchers estimate that the controllers of the vast system are netting about $7,000 (£4,430) a day or more than $2m (£1.28m) per year.

While this was a good return, said the researchers, it did suggest that spammers were not making the vast sums of money that some people have predicted in the past. They suggest that the tight costs might also open up new avenues of attack on spammers. The researchers concluded: “The profit margin for spam may be meagre enough that spammers must be sensitive to the details of how their campaigns are run and are economically susceptible to new defences.”