Monday, October 31, 2016

NetBSD 7.0.2 released (October 21, 2016)

NetBSD 7.0.2 released (October 21, 2016)

Introduction

The NetBSD Project is pleased to announce NetBSD 7.0.2, the second security/bugfix update of the NetBSD 7.0 release branch. It represents a selected subset of fixes deemed important for security or stability reasons.
Complete source and binaries for NetBSD 7.0.2 are available for download at many sites around the world. A list of download sites providing FTP, AnonCVS, SUP, and other services may be found athttp://www.NetBSD.org/mirrors/. We encourage users who wish to install via ISO or USB disk images to download via BitTorrent by using the torrent files supplied in the images area. A list of hashes for the NetBSD 7.0.2 distribution has been signed with the well-connected PGP key for the NetBSD Security Officer: http://ftp.NetBSD.org/pub/NetBSD/security/hashes/NetBSD-7.0.2_hashes.asc
NetBSD is free. All of the code is under non-restrictive licenses, and may be used without paying royalties to anyone. Free support services are available via our mailing lists and website. Commercial support is available from a variety of sources. More extensive information on NetBSD is available from our website:

Changes Between 7.0.1 and 7.0.2

The complete list of changes can be found in the CHANGES-7.0.2 file in the top level directory of the NetBSD 7.0.2 release tree. An abbreviated version is below:

Security fixes

The following security advisory was fixed:
Note: Advisories prior to NetBSD-SA2016-006 do not affect NetBSD 7.0.1.
  • Update OpenSSL to 1.0.1u.
  • Update ntp to 4.2.8p8.
  • Update BIND to 9.10.4-P3.
  • Fix several protocol handling issues in X Window System client libraries.
  • libsa getpass: check bounds on input.

Other changes

  • Fix a crash in NFS.
  • Various MIPS pmap improvements.
  • Fix a crash in fss(4) when mounting a snapshot read/write. PR kern/51377.
  • Fix an issue with UFS1 file systems that were created outside of NetBSD.
  • vioif(4): Fix an issue that was causing queue stalls in some environments.
  • Update root.cache to 20160825.
  • evbppc: Actually provide EV64260, OPENBLOCKS200, OPENBLOCKS266, and WALNUT kernel images.
  • sparc64:
    • Fix kernel module relocations. PR kern/51436.
    • Fix RAS for 32-bit kernels.

It's play time!


- wong chee tat :)

NTU to split humanities and social sciences into 2 schools

NTU to split humanities and social sciences into 2 schools
Posted 31 Oct 2016 12:08 Updated 31 Oct 2016 22:14

SINGAPORE: The Nanyang Technological University (NTU) on Monday (Oct 31) announced it will split its humanities and social sciences programmes into two separate schools - the School of Humanities (SoH) and the School of Social Sciences (SSS) - from August 2017.

In its press release, NTU said students majoring in Chinese, English, History, Linguistics and Multilingual Studies and Philosophy will be admitted into SoH, while those studying Economics, Psychology, Public Policy and Global Affairs and Sociology will come under SSS.

The two new schools will be housed under the College of Humanities, Arts and Social Sciences, which also includes the Wee Kim Wee School of Communication and Information, and the School of Art, Design and Media, it added.

"The re-organisation into two schools increases flexibility for future growth and enhances opportunities for collaboration and interdisciplinary research. The new schools will also enable NTU to fulfil the evolving educational needs and aspirations of students," the varsity said.

- CNA/kk


- wong chee tat :)

DBS extends Asia private banking push with ANZ assets purchase

DBS extends Asia private banking push with ANZ assets purchase
Posted 31 Oct 2016 07:43 Updated 31 Oct 2016 21:28

SINGAPORE: DBS Group said on Monday (Oct 31) that it plans to buy Australia and New Zealand Banking Group's (ANZ) wealth and retail businesses in five Asian markets - part of a big private banking push for the Singapore lender and the first significant retreat from Asia for ANZ.

The businesses in Singapore, Hong Kong, China, Taiwan and Indonesia will be sold for around S$110 million, in a deal that underscores how smaller players are being squeezed out of private banking due to lack of scale.

"Further investments do not make sense for us given our competitive position and the returns available to ANZ," Chief Executive Shayne Elliott said in a statement.

Mr Elliott also told an analysts call the bank would look to exit its retail and wealth assets in the Philippines, Vietnam, Cambodia and Laos separately.

He added that for the bank to have remained competitive, it would have had to invest further in developing its branch network and digital capacity.

The deal will help DBS build up its leading position in the region, said Ms Tan Su Shan, DBS' head of consumer banking and wealth management, noting that the Singapore lender had recently entered the top five bank rankings for the Asia-Pacific region.

DBS and local rival Oversea-Chinese Banking Corp have been aggressively bidding for the Western private banking assets for sale in Asia.

DBS, Singapore's biggest lender, is also weighing a bid for ABN AMRO's Asian private bank, sources have told Reuters.

ANZ TO FOCUS ON INSTITUTIONAL BANKING IN ASIA

The ANZ transaction is expected to be completed progressively from the second quarter of 2017, with full completion in all markets expected by early 2018.

Most of its staff currently employed in the affected units will join DBS, ANZ said, adding that it will focus on its institutional banking business in Asia instead.

ANZ, Australia's third-largest bank by market value, also said it would take a loss of A$265 million (S$280.8 million) on the sale, including write-downs, and added the sale was expected to increase its Tier 1 capital ratio by 15 to 20 basis points. The losses are set to be booked in the first half of the current financial year.

They will come on top of A$360 million in one-off charges that will be booked in the year just ended. Those earnings are due to be released in full on Thursday.

In 2009, ANZ acquired the Royal Bank of Scotland's retail, wealth and commercial businesses in Taiwan, Singapore, Indonesia and Hong Kong, as well as institutional businesses in Taiwan, the Philippines and Vietnam for US$550 million (S$766 million).

The move was part of a "super-regional strategy" led by former ANZ Chief Executive Mike Smith, who left the bank last year.

DBS Q3 PROFIT STABLE, BAD DEBT CHARGES UP

The news comes as DBS posted a slight increase in its third-quarter net profit, in line with expectations, although bad debt provisions rose sharply due to its exposure to the troubled oil and gas sector.

Singapore banks are grappling with growing risks to earnings as credit woes deepen for the offshore services sector, which has been hit hard by an almost two-year rout in oil prices that lasted until early this year.

DBS said net profit came in at S$1.071 billion in the third quarter that ended in September, versus a profit of S$1.066 billion a year earlier. That compares with an average forecast of S$1 billion from five analysts polled by Reuters.

Bad debt charges rose to S$436 million in the third quarter from S$178 million a year ago.

- REUTERS/CNA/cy


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Oct 10th - Caught a Shellder


Caught this Shellder nearby.


- wong chee tat :)

Oct 10th - Combating a Highly Skilled Arbok


Combating with a Highly Skilled Arbok! Finally, caught it!


- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

McAfee DAT version = 8334 (oct 30th 2016)

McAfee DAT version = 8334 (oct 30th 2016)

Link: here ( Select Yes. And it keeps getting updated daily. Region=US)



- wong chee tat :)

Sunday, October 30, 2016

McAfee DAT version = 8333 (oct 29th 2016)

McAfee DAT version = 8333 (oct 29th 2016)

Link: here ( Select Yes. And it keeps getting updated daily. Region=US)



- wong chee tat :)

DAT update requests to CommonUpdater2 result in a full DAT download instead of an incremental update

DAT update requests to CommonUpdater2 result in a full DAT download instead of an incremental update
Technical Articles ID:   KB87983
Last Modified:  10/27/2016

Environment
McAfee DAT Files

Summary
When attempts are made to update the DATs for your McAfee security products through CommonUpdater2, a full DAT update is downloaded instead of an incremental (smaller) DAT update. This can have a negative impact on your network infrastructure due to the increased bandwidth requirement of updating multiple clients with the full DAT set.

NOTE: This issue affects only those customers updating from CommonUpdater2. Other CommonUpdater locations such as CommonUpdater and CommonUpdater3 are unaffected.
Why does this happen?
Typically clients pull incremental updates when updating DATs. These incremental updates will update the client from their current DAT revision to the latest. In order to achieve this, a delta is constructed from the previous day's content to the current day's content. This delta forms the incremental DAT, which is posted on CommonUpdater2 for download.

On Tuesday, October 25th, an update was posted to CommonUpdater2 that resulted in an invalid incremental. When the McAfee point-products attempt to apply this update, they detect this invalid incremental and initiate a full DAT download instead to ensure that valid protection is maintained.

NOTE: Only products using V2 DATs are affected by this issue.  ENS DATs (V3 DATs) are not affected.


Should I change to a different CommonUpdater location?
No.  Even though the other CommonUpdater locations are not affected, switching CommonUpdater locations will trigger another full update by default to ensure full DAT coverage.


What can I do about this issue?
To mitigate against this issue, you should configure your ePolicy Orchestrator (ePO) to spread the update load over a longer timeframe. For details on how to configure ePO to do this, refer to the Configuring product updates section of the ePO 5.3 Best Practices Guide: PD26432. Specifically, you should aim to reduce the impact on your network by doing the following:

Configuring the client tasks to perform updates at an off-peak time
Setting the repeat interval and randomization appropriately for the size of your estate and available bandwidth

NOTE: If you have Global Updates enabled and have not run a repository 'pull' since Monday 24th, deselect DAT under Server Settings, Global Updates on your ePO servers, and then schedule your updates as described above.


What is Intel Security doing about it?
Because any changes would result in more customers needing to download a full update, we are taking no additional action at this time. However, Intel Security will be implementing additional tests and checks to prevent incidents of this type in the future.
Related Information
For more details on the changes to McAfee DAT files in Q4 2016 see: KB87709.



- wong chee tat :)

HDB Issues Rated Fixed Rate Notes

HDB Issues Rated Fixed Rate Notes
HDB Issues Rated Fixed Rate Notes
Published Date: 16 Sep 2016

The Housing & Development Board ("HDB") has issued S$600 million, 10-year Fixed Rate Notes (the “Notes”) under its S$32 billion Multicurrency Medium Term Note ("MTN") Programme.

2 The Notes have a coupon of 2.035% per annum payable semi-annually in arrear. The Notes were issued on 16 September 2016 and will mature on 16 September 2026. The Notes are rated Aaa by Moody’s Investors Service.

3 The Notes are in denominations of S$250,000 and were offered by way of placement to investors who fall within Sections 274 and/or 275 of the Securities and Futures Act, Chapter 289 of Singapore. Approval in principle for the listing of the Notes on the Singapore Exchange Securities Trading Limited (“SGX-ST”) has been obtained. Admission of the Notes to the Official List of the SGX-ST is not to be taken as an indication of the merits of HDB, its subsidiaries or the Notes. The Notes are cleared through The Central Depository (Pte) Limited.

4 The Joint Lead Managers are CIMB Bank Berhad, RHB Securities Singapore Pte. Ltd. and Standard Chartered Bank.

5 Under HDB's MTN programme, HDB may from time to time, issue bonds (or notes) to finance its development programmes and working capital requirements as well as to refinance the existing borrowings.

6 HDB was set up as a statutory board on 1 February 1960. HDB houses over 80% of Singapore's resident population, with more than 9 in 10 HDB dwellers owning the flats they live in. This has made Singapore one of the highest home ownership nations in the world. Providing affordable and quality housing, creating vibrant and sustainable towns, and promoting active and cohesive communities, will remain the focus for HDB.



NOT FOR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN OR INTO THE UNITED STATES OR TO U.S. PERSONS



This announcement is not an offer for sale of securities in the United States. The Notes have not been and will not be registered under the U.S. Securities Act of 1933 (as amended), and may not be offered or sold in the United States or to U.S. persons absent registration under, or an applicable exemption from, the registration requirements of the U.S. securities laws. No public offering of securities is being made in the United States or in any other jurisdiction where such an offering is restricted or prohibited. A rating is not a recommendation to buy, sell or hold any securities and may be subject to suspension, reduction or withdrawal at any time by the rating agencies.

- wong chee tat :)

HDB Issues Rated Fixed Rate Notes

HDB Issues Rated Fixed Rate Notes
HDB Issues Rated Fixed Rate Notes
Published Date: 10 Aug 2016

The Housing & Development Board ("HDB") has issued S$700 million, 7-year Fixed Rate Notes (the “Notes”) under its S$32 billion Multicurrency Medium Term Note ("MTN") Programme.

2 The Notes have a coupon of 1.910% per annum payable semi-annually in arrear. The Notes were issued on 10 August 2016 and will mature on 10 August 2023. The Notes are rated Aaa by Moody’s Investors Service.

3 The Notes are in denominations of S$250,000 and were offered by way of placement to investors who fall within Sections 274 and/or 275 of the Securities and Futures Act, Chapter 289 of Singapore. Approval in principle for the listing of the Notes on the Singapore Exchange Securities Trading Limited (SGX-ST) has been obtained. Admission of the Notes to the Official List of the SGX-ST is not to be taken as an indication of the merits of HDB, its subsidiaries or the Notes. The Notes are cleared through The Central Depository (Pte) Limited.

4 The Joint Lead Managers are DBS Bank Ltd., Maybank Kim Eng Securities Pte. Ltd., Oversea-Chinese Banking Corporation Limited, United Overseas Bank Limited and The Hongkong and Shanghai Banking Corporation Limited, Singapore Branch.

5 Under HDB's MTN programme, HDB may from time to time, issue bonds (or notes) to finance its development programmes and working capital requirements as well as to refinance the existing borrowings.

6 HDB was set up as a statutory board on 1 February 1960. HDB houses over 80% of Singapore's resident population, with more than 9 in 10 HDB dwellers owning the flats they live in. This has made Singapore one of the highest home ownership nations in the world. Providing affordable and quality housing, creating vibrant and sustainable towns, and promoting active and cohesive communities, will remain the focus for HDB.

NOT FOR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN OR INTO THE UNITED STATES OR TO U.S. PERSONS

This announcement is not an offer for sale of securities in the United States. The Notes have not been and will not be registered under the U.S. Securities Act of 1933 (as amended), and may not be offered or sold in the United States or to U.S. persons absent registration under, or an applicable exemption from, the registration requirements of the U.S. securities laws. No public offering of securities is being made in the United States or in any other jurisdiction where such an offering is restricted or prohibited. A rating is not a recommendation to buy, sell or hold any securities and may be subject to suspension, reduction or withdrawal at any time by the rating agencies.



- wong chee tat :)

HDB Issues Rated Fixed Rate Notes

HDB Issues Rated Fixed Rate Notes
HDB Issues Rated Fixed Rate Notes
Published Date: 19 Jul 2016

             The Housing & Development Board ("HDB") has issued S$700 million, 5-year Fixed Rate Notes (the “Notes”) under its S$32 billion Multicurrency Medium Term Note ("MTN") Programme.

2          The Notes have a coupon of 1.47% per annum payable semi-annually in arrear. The Notes were issued on 19 July 2016 and will mature on 19 July 2021. The Notes are rated Aaa by Moody’s Investors Service.

3          The Notes are in denominations of S$250,000 and were offered by way of placement to investors who fall within Sections 274 and/or 275 of the Securities and Futures Act, Chapter 289 of Singapore. Approval in principle for the listing of the Notes on the Singapore Exchange Securities Trading Limited (SGX-ST) has been obtained. Admission of the Notes to the Official List of the SGX-ST is not to be taken as an indication of the merits of HDB, its subsidiaries or the Notes. The Notes are cleared through The Central Depository (Pte) Limited.

4          The Joint Lead Managers are Australia and New Zealand Banking Group Limited, Deutsche Bank AG, Singapore Branch and Standard Chartered Bank.

5          Under HDB's MTN programme, HDB may from time to time, issue bonds (or notes) to finance its development programmes and working capital requirements as well as to refinance the existing borrowings.

6          HDB was set up as a statutory board on 1 February 1960. HDB houses over 80% of Singapore's resident population, with more than 9 in 10 HDB dwellers owning the flats they live in. This has made Singapore one of the highest home ownership nations in the world. Providing affordable and quality housing, creating vibrant and sustainable towns, and promoting active and cohesive communities, will remain the focus for HDB.

NOT FOR DISTRIBUTION, DIRECTLY OR INDIRECTLY, IN OR INTO THE UNITED STATES OR TO U.S. PERSONS

This announcement is not an offer for sale of securities in the United States. The Notes have not been and will not be registered under the U.S. Securities Act of 1933 (as amended), and may not be offered or sold in the United States or to U.S. persons absent registration under, or an applicable exemption from, the registration requirements of the U.S. securities laws. No public offering of securities is being made in the United States or in any other jurisdiction where such an offering is restricted or prohibited.  A rating is not a recommendation to buy, sell or hold any securities and may be subject to suspension, reduction or withdrawal at any time by the rating agencies.




- wong chee tat :)

System Status: File Server Maintenance

System Status: File Server Maintenance

The file server is temporarily down for routine disk maintenance.


- wong chee tat :)

Blog Updates:

Blog Updates:

Minor updates:

- Update labels on some old posts

Will continue to make minor improvements for this blog!

- wong chee tat :)

Pokémon - Cyber Soldier Porygon/Electric Soldier Porygon - Seizure Scene Clip [1997]




This, is the famous scene from an episode of Pokémon called Dennō Senshi Porygon (でんのうせんしポリゴン) (Translated in English as Cyber Soldier Porygon or Electric Soldier Porygon). The scene itself contains Pikachu, who uses a Thunderbolt attack on some vaccine missiles from a computer program, causing an explosion, emitting a flashing blue and red light, which flashes very fast. This, is the scene that has induced photosensitive epileptic seizures in a substantial number of Japanese viewers, an incident referred to as the "Pokémon Shock" (ポケモンショック Pokemon Shokku) by the Japanese press. 685 viewers were taken to hospitals; 2 people remained hospitalized for more than two weeks. Due to this, the episode has not been rebroadcast worldwide. After the incident, the Pokémon anime went into a four-month hiatus, and it returned on TV Tokyo in April 16, 1998, thus making the episode perhaps the most controversial episode of the entire Pokémon series. Since then, the episode has been parodied and referenced in cultural media, including The Simpsons and South Park.

This episode aired only once on December 16, 1997 and was never shown again.



- wong chee tat :)

09th Oct - Porygon


Caught a weak Porygon


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

Medicine Master Buddha


- Pic from Internet


- wong chee tat :)

Saturday, October 29, 2016

Pokémon Electric Soldier Porygon Full Episode




- wong chee tat :)

10th Oct - Goldfish Rewards



These kitties reward me Gold fish!


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

McAfee DAT version = 8332 (oct 28th 2016)

McAfee DAT version = 8332 (oct 28th 2016)

Link: here ( Select Yes. And it keeps getting updated daily. Region=US)



- wong chee tat :)

Scheduled Maintenance - POSB

Scheduled Maintenance - POSB

We are constantly upgrading our systems to bring you a more pleasant banking experience. During the mentioned period of scheduled maintenance, some of the services will not be available:

Bank Website

Date
Maintenance Period
Services under Maintenance
23 Oct 2016
0200hrs to 0400hrs
Document Upload for the following application(s) :

- New Credit Card Application
- Cashline Application

iBanking

Date
Maintenance Period
Services under Maintenance
Every Sunday
0400hrs to 0700hrs
System Maintenance

- Foreign Currency Current Account (FCCA)
- Foreign Currency Fixed Deposit (FCFD)
- Multi-currency Autosave (MCA)
- Multiplier Account
23 Oct 2016
0000hrs to 0600hrs
System Maintenance

- Fast Funds Transfer to Other Bank (New/Existing Payee)
- Adhoc Fast Funds Transfer to Other Bank
23 Oct 2016
0000hrs to 0700hrs
- Token Replacement
- Token Registration
23 Oct 2016
0250hrs to 0255hrs
0640hrs to 0645hrs 
- MCSA Funds Transfer, and Portfolio Enquiry
23 Oct 2016
0250hrs to 0645hrs
- Online Funds Trading (OET)
23 Oct 2016
0250hrs to 1345hrs
- Online Equity Trading (OET)
5 Nov 2016
to
6 Nov 2016
1000hrs to 1300hrs
- iB trading services
- Online Equity Trading (OET)

digibank app

Date
Maintenance Period
Services under Maintenance
23 Oct 2016
0000hrs to 0600hrs
System Maintenance

- Fast Funds Transfer to Other Bank (New/Existing Payee)
- Adhoc Fast Funds Transfer to Other Bank
23 Oct 2016
0000hrs to 0700hrs
- Token Replacement
- Token Registration
23 Oct 2016
0250hrs to 0255hrs
0640hrs to 0645hrs
- MCSA Funds Transfer, and Portfolio Enquiry


- wong chee tat :)

Friday, October 28, 2016

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :

My lunch craving - Double filet meal


Had a double filer meal for lunch. Top up it with a 9 piece dipper too!


- wong chee tat :)

McAfee DAT version = 8331 (oct 27th 2016)

McAfee DAT version = 8331 (oct 27th 2016)

Link: here ( Select Yes. And it keeps getting updated daily. Region=US)



- wong chee tat :)

Pokémon GO - Halloween Is Approaching...





- wong chee tat :)

Trainers, Pokémon GO is being updated to version 0.43.4 for Android and 1.13.4 for iOS with minor bug fixes.

2016. 10. 26
Trainers, Pokémon GO is being updated to version 0.43.4 for Android and 1.13.4 for iOS with minor bug fixes.






- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Thursday, October 27, 2016

Update Regarding DDoS Event Against Dyn Managed DNS on October 21, 2016

Update Regarding DDoS Event Against Dyn Managed DNS on October 21, 2016
Incident Report for Dyn, Inc.

Update
The Dyn Analysis Summary of Friday, October 21st DDoS can be found here: http://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/
Posted about 20 hours ago. Oct 26, 2016 - 16:43 UTC
Monitoring
Customers seeking additional information pertinent to the incident may reference the following, extended statement: http://hub.dyn.com/dyn-blog/dyn-statement-on-10-21-2016-ddos-attack
Posted 5 days ago. Oct 22, 2016 - 21:30 UTC
Identified
This Preliminary Findings Report is to provide additional detail in connection with an incident that began on October 21, 2016 at approximately 11:10 UTC and lasted until approximately 17:45 UTC

Dyn is dedicated to delivering the highest quality of service, and as such, we take any customer impacting events very seriously. Below you will find a preliminary analysis of the event. A more in-depth analysis will be distributed in the form of a Root Cause Analysis report at a later date.

Service Affected: Managed DNS

Event cause:
On Friday October 21, 2016 at approximately 11:10 UTC, Dyn came under attack by a large Distributed Denial of Service (DDoS) attack against our Managed DNS infrastructure in the US-East region. Customers affected may have seen regional resolution failures in US-East and intermittent spikes in latency globally. Dyn’s engineers were able to successfully mitigate the attack at approximately 13:20 UTC, and shortly after, the attack subsided. See original status post here: https://www.dynstatus.com/incidents/nlr4yrr162t8.
At roughly 15:50 UTC a second DDoS attack began against the Managed DNS platform. This attack was distributed in a more global fashion. Affected customers may have seen intermittent resolution issues as well as increased global latency. At approximately 17:00 UTC, our engineers were again able to mitigate the attack and service was restored.

At Dyn, we take every incident seriously and work hard to ensure we deliver the service our customers have come to expect. We will continue to evaluate every situation with the goal of improving our systems and processes to deliver the utmost customer experience. Thank you for your continued support.
Oct 21, 2016 - 22:11 UTC

This incident affects: Dyn Managed DNS (Anycast Network).


- wong chee tat :)

OCBC posts 5% jump in Q3 profit, beating expectations

OCBC posts 5% jump in Q3 profit, beating expectations
Posted 27 Oct 2016 09:15 Updated 27 Oct 2016 09:20

SINGAPORE: The Oversea-Chinese Banking Corp (OCBC) beat estimates with a 5 per cent rise in quarterly profit in the third quarter of the year, helped by gains from its insurance and wealth management units, according to its financial results released on Thursday (Oct 27).

However, the bank warned of a challenging operating environment. The city-state's lenders must contend with growing risks to earnings as credit woes deepen for the offshore services sector, which has been hit hard by a drop-off in orders due to a near-two year rout in oil prices until early this year.

Net profit for Singapore's second-biggest bank came in at S$943 million in the third quarter as its insurance and wealth management business powered a 25 per cent climb in non-interest income.

The result handily beat expectations for a decline in profit with the average estimate at S$834 million from five analysts polled by Reuters.

But provisions for bad debt jumped almost 11 per cent to S$166 million, while net interest income dropped 6 per cent due to lower loan volumes and a weaker net interest margin.

"We continue to keep a firm grip on cost, maintain strong liquidity and capital, and ensure prudent levels of provisioning," OCBC Chief Executive Samuel Tsien said in a statement.

Offshore firms that have said they are struggling with debt payments include oilfield services company Swiber Holdings, which was placed under judicial management this month.

Signs of weakness in a trade-dependent economy and the domestic property market are also further squeezing loan demand.

- Reuters/mz


- wong chee tat :)

‘No indication’ devices from Singapore contributed to US cyberattack: CSA

‘No indication’ devices from Singapore contributed to US cyberattack: CSA
By Kevin Kwang  Posted 27 Oct 2016 13:39 Updated 27 Oct 2016 13:40

SINGAPORE: There is no indication that devices from Singapore contributed to the attack against US-based domain name service provider Dyn, which resulted in Web services like Twitter, Spotify and Reddit experiencing downtime, the Cyber Security Agency of Singapore (CSA) said on Wednesday (Oct 26).

In its reply to queries by Channel NewsAsia, a CSA spokesperson said there is a wide range of Internet-connected devices manufactured from various countries on the market, and that any of these devices could be commandeered by hackers anywhere in the world. These cybercriminals can, in turn, direct the zombie devices to take down a targeted site by flooding it with Web traffic.

Dyn on Wednesday shed more light on the Oct 21 attack on its managed DNS infrastructure, with the company’s EVP of Product Scott Hilton stating in a blogpost that the attack was “complex and sophisticated”, and confirming that the Mirai botnet was the primary source of malicious attack traffic.

Mirai is a malware that targets insecure Internet of Things (IoT) devices such as webcams and home routers, and the source code for the malware was released on the open Web earlier in October before the Dyn attack took place.

Chinese manufacturer Hangzhou Xiongmai was fingered as the maker of compromised webcams used in the Dyn attack, and said it would recall as many as 10,000 infected devices as a result. Mr Li Yuexin, Xiongmai’s marketing director, told Reuters on Tuesday that the company would recall the first few batches of surveillance cameras made in 2014 that monitor rooms or shops for personal use.

Threat research company Flashpoint had actually flagged the company as early as Oct 7, after similar large-scale DDoS attacks were conducted on security research Brian Kreb’s blog and French Web hosting company OVH. Flashpoint researchers said then that Xiongmai sells white-labelled DVRs, IP cameras and software to other vendors who then use these in their own products.

“Altogether, over 500,000 devices on public IPs around the world appear susceptible to this vulnerability,” according to the security note.

Local telco StarHub had on Wednesday also identified such compromised devices as the cause for DDoS attacks that resulted in two broadband outages it suffered on Oct 22 and Oct 24. It stopped short of linking its downtime with that of the attack on Dyn.

The attack on StarHub was the first of that nature on Singapore’s infrastructure, according to the CSA and Infocomm Media Development Authority.

- CNA/cy

- wong chee tat :)

Australia e-census attack 'incorrectly' attributed to Singapore-based router: CSA

Australia e-census attack 'incorrectly' attributed to Singapore-based router: CSA
Posted 25 Oct 2016 19:54 Updated 25 Oct 2016 20:00

SINGAPORE: The Cyber Security Agency of Singapore (CSA) on Tuesday (Oct 25) refuted reports that cyber attacks which shut down a national census in Australia were launched through a router based in Singapore.

In a statement, the CSA said that it was "surprised at media reports on IBM Australia’s assertions that the majority of international traffic which caused the crash of the Australian Bureau of Statistics (ABS) Census website originated from Singapore."

International Business Machines Corp (IBM) was the lead contractor for the five-yearly Aug 9 household survey by the ABS, which went offline that day after four distributed denial of service (DDoS) attacks, caused by the website being flooded with clicks.

At a Senate inquiry into the matter, IBM Australia and New Zealand managing director Kerry Purcell said that the attacks were launched through a router in Singapore. He blamed Australian ISP Vocus Communications, a subcontractor of Nextgen Networks, for failing to shut it down.

Singapore's CSA questioned IBM's assertion in its statement. "For matters of such nature, it is usual practice for national Computer Emergency Readiness Teams (CERTs) to make inquiries and seek assistance from one another," the agency said.

"In this instance, our SingCERT was not informed of any such attack by CERT Australia. We were also not approached at any point. As such, it is strange that IBM Australia reached such a conclusion."

The agency added that it has contacted CERT Australia for more information, and that it was ready to assist the Australian authorities where required. "According to CERT Australia, some internal ABS infrastructure was hosted in Singapore. There may have been possible misunderstanding in the news reporting of this issue, which incorrectly attributed the DDoS attack source to Singapore."

IBM said on Tuesday that it plans to compensate the Australian government for the "malicious" cyber-attacks.

The breach embarrassed a government which has sought to impress voters with its cybersecurity credentials and plans to trial online elections. The census is already controversial because of privacy concerns.

In a written submission to the inquiry, IBM said its preferred anti-DDoS measure, which it calls "Island Australia", involves "geoblocking", or getting the company's ISPs to shut down offshore traffic coming into the country.

In a written submission to the inquiry, Nextgen said IBM told it about "Island Australia" six days before the census website went live in July, and that IBM declared a test of the strategy four days before the census a success.

It said Nextgen followed IBM's instructions, but noted that IBM rejected Nextgen's offer of additional anti-DDoS detection measures.

Vocus said in a submission that it told Nextgen the week before the census that it "did not provide geoblocking" and that "Vocus was in fact requested to disable its DDoS protection product covering the e-Census IP space".

It did not specify who gave that instruction.

ABS chief statistician David Kalisch said he was confident IBM could deliver on its A$10 million ($7.63 million) contract based on "the comments and exhortations that IBM had made to the ABS about the importance of this work" beforehand.

- CNA/Reuters/nc

- wong chee tat :)

Broadband service outages due to DDoS attacks: StarHub

Broadband service outages due to DDoS attacks: StarHub
Posted 25 Oct 2016 15:36 Updated 25 Oct 2016 23:07

SINGAPORE: The two recent broadband service outages that hit StarHub were the result of "intentional and likely malicious attacks" on its servers, the telco confirmed on Tuesday (Oct 25), adding that the attacks were "unprecedented in scale, nature and complexity".

In a media statement, StarHub said: "We have completed inspecting and analysing network logs from the home broadband incidents on Oct 22 and Oct 24 and we are now able to confirm that we had experienced intentional and likely malicious distributed denial-of-service (DDoS) attacks on our domain name servers (DNS).

"These two recent attacks that we experienced were unprecedented in scale, nature and complexity," it said.

Starhub said that the DDoS attacks caused temporary web connection issue for some of its home broadband customers. "On both occasions, we mitigated the attacks by filtering unwanted traffic and increasing our DNS capacity, and restored service within two hours. No impact was observed on the rest of our services, and the security of our customers’ information was not compromised."

The broadband service provider said it would continue to stay vigilant against possible follow-up DDoS attempts, and is working closely with the authorities to determine intent and source of these two DDoS attacks.

Earlier on Tuesday, the Cyber Security Agency (CSA) and the Infocomm Media Development Authority (IMDA) said that the possibility of a DDoS attack could not be ruled out, and noted that StarHub's outages came on the heels of Friday’s attack against the US-based domain name system service provider Dyn.

StarHub had earlier said it detected a "spike in data traffic" coming into its domain name servers (DNS) that temporarily affected the Web connection for some of its home broadband customers during the time of the outage.

A DNS is a database that translates Web addresses, such as www.nameofwebsite.com, into machine readable sets of digits for customers to view websites on their computers.

"When a DNS is not operating optimally, customers may face difficulty in accessing the Internet," the telco said.

After detecting the sudden increase in traffic to the servers, StarHub said it immediately started filtering the unwanted traffic and added DNS capacity to manage the "huge increase in traffic load". As a result, some customers temporarily faced intermittent broadband access, it said.

The telco added that there was no impact on its mobile broadband, enterprise and home voice services, and the security of customers’ information was not compromised.

According to StarHub, the home broadband service for affected customers was fully restored at about 11.25pm on Monday.

The company said that initial investigations pointed to similarities between the outage on Monday and the first incident last Saturday.

- CNA/mz/ek

- wong chee tat :)

Possibility of DDoS attack on StarHub broadband service cannot be ruled out: IMDA

Possibility of DDoS attack on StarHub broadband service cannot be ruled out: IMDA
Posted 25 Oct 2016 18:09 Updated 25 Oct 2016 22:21

SINGAPORE: Authorities are not ruling out the possibility of a Distributed Denial of Service (DDoS) attack in the two outages that telco StarHub's broadband service saw in the space of two days.

In a joint statement to the media on Tuesday (Oct 25), the Cyber Security Agency (CSA) and the Infocomm Media Development Authority (IMDA) said: "We have been paying close attention to developments as it happened on the heels of Friday’s attack against the US-based domain name system service provider, Dyn. We cannot rule out the possibility that this was a DDoS attack."

Earlier on Tuesday, StarHub said Monday's outage came after it detected a "spike in data traffic" coming into its domain name servers. The telco said it is currently investigating the root cause, including whether the spike in traffic was malicious in intent.

"What is important now is for StarHub to determine the root cause of the problem and prevent a recurrence," said IMDA and CSA in their joint statement.

"IMDA is working closely with StarHub to investigate the matter and strengthen its infrastructure and processes.

OTHER TELCOS ADVISED TO STEP UP DEFENCES

In the statement, IMDA said it also advised the other telcos to step up their defences in case there are similar disruptions to their systems.

Responding to queries from Channel NewsAsia's, Singtel said it has measures in place to safeguard its network.

“We did not observe any abnormal traffic trends over the past weekend, but will continue to monitor our networks closely. We have a robust monitoring system and resilient protection mechanisms in place to safeguard our networks,” a spokesperson told Channel NewsAsia.

M1 said it is "aware of the recent cyber-attacks and is on alert".

"We have made significant investments to defend our systems against cyber-attacks, including DDoS attacks," said Mr Chua Hian Hou, assistant general manager of corporate communications at M1.

In the joint statement, CSA added that it is "studying and addressing the risks of DDoS attacks on our communications systems, as well as the measures to mitigate the impact of such attacks if they happen."

CSA added that it would also reach out to educate the public and businesses on the need to properly secure their systems.

- CNA/dt

- wong chee tat :)

StarHub broadband service suffers second outage in 2 days

StarHub broadband service suffers second outage in 2 days
Posted 24 Oct 2016 23:07 Updated 25 Oct 2016 09:04

SINGAPORE: Customers of telco StarHub took to social media to air their frustrations about a second broadband service outage on Monday evening (Oct 24), two days after the first outage.

Singer Taufik Batisah was among the StarHub customers who joined in the chorus of complaints, commenting that they had to rely on their mobile data for their Internet connection instead.

In response to queries by Channel NewsAsia, a StarHub spokesperson said: "We are aware that some broadband customers are facing difficulties accessing the Internet. We are looking into this right now, and will provide our customers with updates through our Facebook page."

In a post on its Facebook page on Tuesday at 1.25am, StarHub said that at about 11.20pm on Monday, it rectified a network equipment issue that had temporarily affected their residential broadband service since about 10pm the same day.

"We are currently investigating the root cause of this incident. We have been monitoring the service in the past two hours to ensure it remains stable for our customers, and thank everyone for their patience and understanding."

StarHub had also attributed Saturday's outage to a "network equipment issue", which it fixed at 2am on Sunday.

- CNA/ek


- wong chee tat :)

Starhub fibre broadband service outage sparks customers' ire

Starhub fibre broadband service outage sparks customers' ire
Posted 22 Oct 2016 23:30 Updated 23 Oct 2016 02:32

SINGAPORE: StarHub customers took to social media to air their frustrations following a fibre broadband service outage by the local telco on Saturday evening (Oct 22).

According to affected StarHub customers on social media, the outage started at around 10.00pm.

Responding to queries from Channel NewsAsia, a StarHub spokesperson said the telco is “working as fast as it can to fix an issue affecting customers' broadband service” and added that updates on the outage will be provided on its Facebook page.

"Our engineers are continuing to work to rectify the situation as soon as possible for customers. Updates to come."

In a Facebook post at 2.00am on Sunday, StarHub said they have since rectified a network equipment issue and are now closely monitoring the situation to ensure the service stabilises for their customers.




- CNA/xk

- wong chee tat :)

Broadband service outages due to DDoS attacks: StarHub

Broadband service outages due to DDoS attacks: StarHub
Posted 25 Oct 2016 15:36 Updated 25 Oct 2016 23:07

SINGAPORE: The two recent broadband service outages that hit StarHub were the result of "intentional and likely malicious attacks" on its servers, the telco confirmed on Tuesday (Oct 25), adding that the attacks were "unprecedented in scale, nature and complexity".

In a media statement, StarHub said: "We have completed inspecting and analysing network logs from the home broadband incidents on Oct 22 and Oct 24 and we are now able to confirm that we had experienced intentional and likely malicious distributed denial-of-service (DDoS) attacks on our domain name servers (DNS).

"These two recent attacks that we experienced were unprecedented in scale, nature and complexity," it said.

Starhub said that the DDoS attacks caused temporary web connection issue for some of its home broadband customers. "On both occasions, we mitigated the attacks by filtering unwanted traffic and increasing our DNS capacity, and restored service within two hours. No impact was observed on the rest of our services, and the security of our customers’ information was not compromised."

The broadband service provider said it would continue to stay vigilant against possible follow-up DDoS attempts, and is working closely with the authorities to determine intent and source of these two DDoS attacks.

Earlier on Tuesday, the Cyber Security Agency (CSA) and the Infocomm Media Development Authority (IMDA) said that the possibility of a DDoS attack could not be ruled out, and noted that StarHub's outages came on the heels of Friday’s attack against the US-based domain name system service provider Dyn.

StarHub had earlier said it detected a "spike in data traffic" coming into its domain name servers (DNS) that temporarily affected the Web connection for some of its home broadband customers during the time of the outage.

A DNS is a database that translates Web addresses, such as www.nameofwebsite.com, into machine readable sets of digits for customers to view websites on their computers.

"When a DNS is not operating optimally, customers may face difficulty in accessing the Internet," the telco said.

After detecting the sudden increase in traffic to the servers, StarHub said it immediately started filtering the unwanted traffic and added DNS capacity to manage the "huge increase in traffic load". As a result, some customers temporarily faced intermittent broadband access, it said.

The telco added that there was no impact on its mobile broadband, enterprise and home voice services, and the security of customers’ information was not compromised.

According to StarHub, the home broadband service for affected customers was fully restored at about 11.25pm on Monday.

The company said that initial investigations pointed to similarities between the outage on Monday and the first incident last Saturday.

- CNA/mz/ek

- wong chee tat :)

Compromised home devices triggered broadband outages: StarHub

Compromised home devices triggered broadband outages: StarHub
By Kevin Kwang  Posted 26 Oct 2016 19:10 Updated 27 Oct 2016 08:56

SINGAPORE: Web-connected devices bought by StarHub subscribers were the cause of the "illegitimate traffic" that resulted in the distributed denial of service (DDoS) the telco suffered twice in two days, said StarHub's chief technology officer (CTO) Mock Pak Lum on Wednesday (Oct 26).

In a media briefing, Mr Mock said affected devices such as broadband routers and webcams were responsible for the spike in Web traffic the telco saw last Saturday and Monday nights.

However, he did not disclose how many devices or IP addresses were compromised, or what was the exact volume in the spike in Web traffic its domain name server (DNS) farms had to handle in a short space of time.

The illegitimate traffic to the DNS resulted in an overload that disrupted Web connection for "some" broadband users, Mr Mock said. "Not everyone was affected," he added, saying that some users would have gotten to their desired webpage if they had waited long enough.

As remedial action, the telco said it has increased DNS capacity by 400 per cent since Saturday, and is also implementing traffic filtering and source tracing to identify the source of Web traffic surges.

It is also looking to deploy its technical team - HubTroopers - to subscribers identified with compromised devices to help them troubleshoot. This could either be done at their homes or, with their permission, taken back to StarHub for further investigation.

That said, the CTO said his team is working to scrub through the logs to see if the traffic spike was linked to the attack on US-based Dyn DNS. He noted that there are similarities in that compromised connected home devices were used to conduct the attack, but that it was too early to draw any conclusion.

He also could not comment as to why only StarHub was attacked by the compromised devices, while other Internet service providers were not affected.

StarHub is working with the Cyber Security Agency of Singapore (CSA) in terms of sharing information from its investigations, he added.

In the meantime, Mr Mock stressed that "everyone has a role to play in cybersecurity". "The reward is now too huge" for cybercriminals and the online threat will be "prevalent for a long time to come", the CTO said.

He suggested that consumers only get devices that are "reputable", remember to change the default passwords and set up the necessary defences such as firewalls after buying the devices.

He also cautioned against blindly opening up Web links sent from friends via emails, for instance, as this could potentially lead to malware being downloaded into the device without the user's knowledge.

DDoS ATTACKS LIKELY TO BE MORE COMMON: EXPERTS

The CSA and the Infocomm Media Development Authority (IMDA) said in a joint statement that the DDoS attacks are the first such incident against Singapore's telco infrastructure, and reiterated that they are working "closely" with StarHub to investigate the matter.

Commenting on StarHub's announcement, Mr John Lim, course manager at Nanyang Polytechnic's School of Information Technology, told Channel NewsAsia that he was not surprised that compromised embedded devices were used to stage the DDoS attacks.

He said that PCs and Macs have become much more secure today, but this is not so for devices such as webcams or routers.

"You cannot just install antivirus on these devices," Mr Lim said.

Additionally, consumers can now shop for such connected devices from e-commerce sites such as Taobao, and many times these are brands that are not known here and there is little to no information on the kind of defences manufacturers have installed, he said.

With the proliferation of these Web-connected devices, Mr Lim said he "won't be surprised if there will be other similar attacks that might affect the other two telcos" in the future.

Other experts Channel NewsAsia spoke to concurred, with one pointing to the gaining popularity of the Internet of Things.

"There's research done that 50 billion devices will be connected in 2020. Just imagine: 50 billion (devices) attacking your organisation," said Mr Vincent Loy, Asia Pacific Cyber & Financial Crime Leader at PwC Singapore.

Mr Loy too added that many devices are not built with security in mind.

"They were built to do a certain function; security was not part of it; they do not have password control. They do not have security control, they do not have a log in or back up. The Government and private sector need to work together to come up with a solution in coming up with security by design," Mr Loy said.

Mr Stephen Dane, a managing director at Cisco Systems (HK), pointed to the need for companies to pay more attention to security.

"It's really important to design a network and your infrastructure with high availability in mind, to ensure that not all your eggs are in one basket when it comes to protecting or providing data and holding records on behalf of customers; or in fact, having a website that's associated with just one domain name server," he said.

"It's important to build that resiliency into your infrastructure and ensure that there's high availability as much as possible, so that you are ensuring that the target is distributed as much as possible and therefore the risk is reduced," he added.

Additional reporting by Alice Chia.

- CNA/kk/dl

- wong chee tat :)

DDoS attack on StarHub first of its kind on Singapore's telco infrastructure: CSA, IMDA

DDoS attack on StarHub first of its kind on Singapore's telco infrastructure: CSA, IMDA
Posted 26 Oct 2016 21:20 Updated 26 Oct 2016 23:35

SINGAPORE: The Distributed Denial of Service (DDoS) attacks on StarHub’s broadband network were the first of that nature on Singapore's telco infrastructure, the Cyber Security Agency of Singapore (CSA) and Infocomm Media Development Authority (IMDA) said on Wednesday evening (Oct 26).

This comes after the telco revealed in a media briefing on Wednesday that compromised devices such as webcams and routers owned by its customers led to the DDoS attacks.

In a joint statement, CSA and IMDA said attacks on Domain Name Services (DNS), as seen in StarHub’s case, are “generally rare”, “although the latest Dyn incident in US has shown that it is surfacing as an emerging trend”.

The agencies added that in DDoS attacks, attackers usually scan for vulnerable Internet-connected devices commonly known as "botnet" and employ a list of techniques - such as password cracking - to gain access to them.

“Any Internet-connected device, from WiFi routers to printers to CCTVs, can inadvertently be part of a network of ‘bots’ that can be activated to attack other systems,” CSA and IMDA said, adding that there is no foolproof solution as digital systems are increasingly connected.

As such, telcos must ensure they have “resilient and robust” systems, and put in place measures to quickly detect and respond to such attacks, so as to avoid disruption of services to their subscribers, CSA and IMDA added.

They reiterated that they are working “closely” with StarHub to investigate the matter, and strengthen the telco’s infrastructure and processes, and said they have advised other telcos in Singapore to step up their defences in case there are similar disruptions to their systems.

Members of the public are also advised to adopt “good cyber hygiene practices” to secure their devices. SingCERT will publish an advisory on what businesses and individuals should do to ensure their Internet-connected devices are secure, CSA and IMDA said.

BUSINESSES SHOULD MAKE CYBER SECURITY A PRIORITY: YAACOB

Communications and Information Minister Yaacob Ibrahim called on businesses to take action to address their specific cyber security needs, even as the Government steps up efforts to help them stay safe.

Speaking at an Asia Pacific cyber security summit on Wednesday, Dr Yaacob said the Government has been consistent in pursuing cyber security development, working with multiple stakeholders, including businesses and international partners. This includes launching the national cyber security strategy earlier this month, and developing a multi-tiered cyber security response plan.

A new Cybersecurity Act is also in the pipeline.

But Dr Yaacob emphasised that the Government cannot do it alone, and urged companies to make cyber security a priority.

"Cyber security should not be seen as a cost, but as an investment to manage risk. Under-investment in cyber security does not mean 'business-as-usual'. Weak cyber defences suffering from under-investment could be breached more easily, leading to disruption of business activities and significant losses," the minister said.

- CNA/dl


- wong chee tat :)

Singapore's cybersecurity skills shortage: Why it matters

Singapore's cybersecurity skills shortage: Why it matters
By Linette Lim  Posted 14 Oct 2016 15:51 Updated 14 Oct 2016 16:00

SINGAPORE: In his speech launching Singapore’s national cybersecurity strategy earlier this week, Prime Minister Lee Hsien Loong warned of cyberattacks and threats “becoming more frequent and sophisticated, with more severe consequences”.

He pointed to how a cyberattack on the power grid in Ukraine last December left many Ukrainians without electricity for hours, and how hackers used malware to withdraw more than US$2 million (S$2.77 million) from ATMs in Taiwan in July this year. Closer to home, he said that there have been attacks on government networks and on the financial sector.

According to a 2014 report from Center for Strategic and International Studies, cybercrime costs Singapore an estimated S$1.25 billion annually.

Yet there is a decidedly acute shortage of IT security specialists that can be engaged to help fend off such online threats.

According to Communications and Information Minister Yaacob Ibrahim, there were 15,000 vacancies in the information and communications technology (ICT) sector last year, unchanged from 2014. More than two-thirds of these vacancies, he said, were for professionals, managers, executives and technicians (PMETs) or technical specialists in areas such as development, network and infrastructure, cybersecurity and data analytics.

Additionally, 2012 data from the Economic Development Board (EDB) showed that just 0.8 per cent of Singapore’s 144,300 ICT workers were IT security specialists, with a particularly acute shortfall in the middle and senior tiers.

MANPOWER GAP HINDERING CYBERCRIME FIGHT

This is why for vendors like Quann, which hires more than 300 certified security professionals in the region, a global shortage of cybersecurity manpower means fighting cybercrime is proving to be an uphill battle.

“There is a distinct (manpower and skills) gap, and the gap has widened. The proxy for that is the wage growth that we’ve seen in this sector. Wages have gone up quite substantially in the last two to three years. Based on some reports by third-party consultancies, wages are estimated to have gone up by 20 per cent per year, over the last couple of years,” said Quann’s managing director Foo Siang-tse.

According to Mr Foo, increasing digitisation of customer and business records and the proliferation of interconnected devices have resulted in greater avenues for cybercriminals, but “until recently”, educational institutions have not expanded capacity quickly enough to keep pace with demand in the sector.

To address this, part of the national cybersecurity strategy is to boost the cybersecurity profession in a number of ways. This includes instituting clear career pathways, promoting certification, and working with the industry and institutes of higher learning to attract new graduates and convert existing professionals from related fields.

WHAT ARE THE SKILLS NEEDED?

One of these organisations is ISACA, the international professional body formerly known as the Information Systems Audit and Control Association. Its Singapore Chapter says the Government is working with industry groups like theirs to offer training and certification programmes.

“Skills that are lacking now are in the areas of intrusion detection, security architecture and analysis, security incident management, secure software development, incident response and recovery,” said Mr John Lee, President of ISACA Singapore Chapter.

“Singapore is a global financial hub with high-end manufacturing and developed service industry. The need to safeguard against a major cyber breach is paramount to prevent erosion of trust by external stakeholders.”

Among the IHLs, the Singapore University of Technology (SUTD) only opened its doors four years ago. Professor Aditya Mathur, who oversees the university’s Information Systems Technology and Design pillar, said he has seen a rise in student enrollments and a growing number of students picking security classes.

“SUTD is not only offering courses in cybersecurity at the undergraduate level but also conducting outreach programmes aimed at raising cybersecurity awareness among secondary school students,” Prof Aditya added.

TAPPING ON EXISTING TALENT POOL

But it will be some time before these students join the workforce and contribute to the core of local cybersecurity talent. In the meanwhile, Mr Foo says Quann is doing its best to meet the manpower challenge through on-the-job training, or through converting existing IT professionals with adjacent skillsets.

The local company is one of four participating in the Cyber Security Associates and Technologists (CSAT) programme, which equips ICT professionals with three years’ working experience to pick up the requisite skills to switch sectors. The other training partners are Singtel, ST Electronics and Accel Systems and Technologies.

Some business leaders who oversee ongoing efforts to help build up Singapore's cybersecurity manpower pool include Mr Boye Vanell from BAE Systems (top-left); Quann’s Mr Foo Siang-tse (bottom-left); and Microsoft Singapore’s Ms Jessica Tan (right). (Photos: BAE Systems, Quann, Microsoft Singapore).

While Quann partners tertiary institutions like the National University of Singapore, the Singapore Management University, and Ngee Ann Polytechnic to get access to talent, others, like British multinational BAE Systems, aim to build up the cybersecurity ecosystem through collaborating with researchers and helping to incubate startup ideas.

One outcome of its partnership with Nanyang Technological University is a threat operating model designed by postgraduate students, built using BAE System’s tools and techniques.

“You need to create the interest in the industry. You do that by running research programmes, and you do that by bringing niche technology to startup companies to help close the gaps that customers face,” said Mr Boye Vanell, Regional Director of Asia at BAE Systems.

Microsoft Singapore’s Managing Director Jessica Tan, who oversaw the company’s opening of a new Transparency Center and Cybersecurity Center in Singapore this month, told Channel NewsAsia that apart from technical skills, other important attributes for cybersecurity professionals include “a growth mindset, curiosity, learning and resilience".

She said: “What is critical is building an ICT foundation in every student, which they can then extend and apply to every field they pursue, regardless of whether it is in biomedicine, behavioural economics or digital manufacturing, to name a few. ICT will touch every facet of the industry and government.”

According to Ms Tan, given that more citizens’ lives are touched by technology - at home, in schools and in the workplace - the talent pipeline of cybersecurity professionals is “both an economic and security imperative for Singapore”. This implies the difficulty in relying too heavily on foreign cybersecurity professionals to plug the gaps.

The unique nature of the industry also means it is relatively labour-intensive, and there are limits to plugging the gaps with technology like big data analytics.

 “At the end of the day, the person at the other end of the kill chain - the perpetrator - is still a human being. Notwithstanding that fact that we have our own R&D labs, we’re looking at tapping on big data and threat intelligence - if the adversary is human, we need humans on our side,” said Mr Foo.

- CNA/ll

- wong chee tat :)