Wednesday, 6 June 2012

HOLLA!!!! about me....

HAI....my name is nur husnina omar...ok my friend call me nina.Im 22 year. I still study, degree in finance at uitm bandar melaka. I have 4 sibling. ok now I want story about my blog.why my blog name anyahaseyo???? its because Im a big of fans Kpop.I like their music,culture and drama. of course super junior,girl generation, bigbang and 2ne1 is my fovourite groups. now, is Kpop fever. no more bollywod... I am open minded and friendly person..I like to be friends. I like and love animal.at home I have eight cat.. my ambitions is, I want to be a teacher..maybe i have a dream,one day i will go to korea with my family..I hope so...


 Before this I further my study at Kolej Profersiona Mara Ayer Molek Melaka in Diploma in Accontancy. I also have experience working at Audit firm. ok in 2012 I want to attend BigBang consert with my friend. I hope so... now I would share picture of MY FOVOURITE KOREA GROUP...asssa!!!!!! check this out....







Saturday, 19 May 2012

I AM A BIG FAN OF KPOP

K-pop (Korean: 가요, Gayo) (an abbreviation of Korean pop or Korean popular music) is a musical genre consisting of pop, dance, electro pop, hip hop, rock, R&B, electronic music originating in South Korea. In addition to music, K-pop has grown into a popular subculture among teenagers and young adults around the world, resulting in widespread interest in the fashion and style of Korean idol groups and singers.

Through the presence of Face book fan pages, availability on iTunes, Twitter profiles, and music videos on YouTube, the ability of K-pop to reach a previously inaccessible audience via the Internet is driving a change in the exposure and popularity of the genre. South Korean popular culture is today serving as a major driver of youth culture all across the Pacific Rim, with special reference to China, Hong Kong ,Japan, Philippines, Taiwan and Thailand.

I am a big fan of KPOP. I am very interested in their music and drama.  I have been exposed to the world of Korea ways since 2009 through my friends. Start that year, I very-very interested in whatever Korea drama and Korea music. Korea music gives me inspiration to do something and improve my spirit when I feel bored.

Next, the famous group in Korea is Super Junior, Girl Generation, Wonder Girl, Big Bang and many more.  The group that I really-really interested is Super Junior, Girl Generation and Big Bang. While the drama that increase the name of Korea is Winter Sonata. Who do not know Korea drama Winter Sonata? I think everyone knows right? This drama has something that can touch our emotion and heart of the audience.

I will share my new hobby. Because I really-really interested in KPOP, I start to collect and buy anything about Kpop.  Every month I will buy magazines that contain Kpop news. I also collect poster Kpop artist. Now I have a lot of poster and magazine about Kpop. My social networking also contains about Kpop and many link in my social networking related to Korea. Not only that, I also learn how and where to download Korea drama. Now I have a lot of Korea Drama in my room and in my hardisk. I also buy Korea Drama through online. I became a loyalty customer to my buyers.
Even thought I hardcore fans of Korea Pop Music (KPOP), I never neglect my studies. I will divide my time properly. If I have free time, I will spend that time by watch Korea Drama.

Friday, 18 May 2012

Advantage and Disadvantages of Blogging

Blogging is popular among the people in today’s society, especially amongst teenagers. In fact, the number of blogs is exploding, with about 14 million existing blogs. On average, the number of blogs is doubling every five months.

There are many advantages of blogging. Firstly, people can use as an online dairy, using it to share the day’s happening in her life with other visitors on the net. Furthermore, if the blogger (author of the blog) has met up with certain incidents in her life, he can share it on the blog and others can console or praise him, by giving comments or leaving a message in the blog’s tag board, depending on the incident. Blogging can also be a good way to relieve stress as some way want to use their blog to vent out their frustration or pour out their woes when stress becomes too much for them. Some bloggers even use their blogs to flaunt their literati skills by posting poems about themselves or things around them.

Secondly, bloggers can also use their blogs to inform others on a certain topic which happens to be his niche, thus allowing others who are interested in the topic to learn some tricks from the blog, they are also post questions to the blogger if they meet up with problems. Other organisations are also using blogs to make announcements to all of its members, as it is a fast and quick way to convey messages to one another.

Anyone can have a blog. The blogger does not necessary need to know how to write complicated hypertext to own a blog. However, knowing how to do so may just allow you to create personalised blog templates or blogskins, in blogging language. Your blog is your world, you choose any topic from and the sun and speak about it, and may it be personal anecdotes or political commentary. Furthermore, it is free!

However, there are also many disadvantages of blogging. Blogs may be a easy way to vent one’s spleen, bloggers should be careful of what they say on their blogs as blogs are easily assessable. Example in the United States, many employers have fired their employees due to their posts on their blogs.. More serious cases can also be punishable by law.
Next, the hate speech on blogs targeted at some specific people might also hurt the targeted victims emotionally, the bloggers might also touch on inflammatory topics such as religion and intentionally or unintentionally hurt a certain group of people. One might think that blogs can be edited or amended, many a time this leads to reckless behaviour in their posts, but once the damage is done, nothing much can be done to salvage the situation. Last but not least, bloggers may infringe copyright laws by posting some material online that might lead to the offenders being prosecuted by law.

In conclusion, blogging has many advantages that many can benefit from, but bloggers would have to beware of the pitfalls or find themselves in hot soup. The blogging society would need to watch what it says or else it might hurt others emotional or cause something that might run out of hand.

Wednesday, 25 April 2012

Why You Need a Computer Network

Here are some of the ways a computer network can help your business:
  • File sharing: Have you ever needed to access a file stored on another computer? A network makes it easy for everyone to access the same file and prevents people from accidentally creating different versions.
  • Printer sharing: If you use a computer, chances are you also use a printer. With a network, several computers can share the same printer. Although you might need a more expensive printer to handle the added workload, it's still cheaper to use a network printer than to connect a separate printer to every computer in your office.
  • Communication and collaboration: It's hard for people to work together if no one knows what anyone else is doing. A network allows employees to share files, view other people's work, and exchange ideas more efficiently. In a larger office, you can use e-mail and instant messaging tools to communicate quickly and to store messages for future reference.
  • Organization: A variety of scheduling software is available that makes it possible to arrange meetings without constantly checking everyone's schedules. This software usually includes other helpful features, such as shared address books and to-do lists.

Friday, 13 April 2012

Top 10 information security threats for 2010

1. Malware

Last year, Malware was listed as the second highest ranked threat to organizations on Perimeter E-Security's list of top threats. There are many methods to install malware on systems, including the use of client-side software vulnerabilities. Browsers remain a top target for vulnerabilities. In 2009, the FBI reported that for the first time ever, revenue from cybercrime had exceeded drug trafficking, estimated at taking in more than one billion annually in profits.

2. Malicious insiders

Malicious insiders were listed as the top threat for 2009, but have fallen to the #2 spot for 2010. With the downturn in the economy last year, it was no surprise that many desperate and disgruntled employees attempted to exploit the companies they currently or previously worked for. There is no way to eliminate the threat of malicious insiders completely, but through good security policies and followed procedures, the incidents could be a fraction of what they are today. With the economy still suffering and still high unemployment levels, Malicious Insiders will continue to be a threat.

3. Exploited vulnerabilities

Vulnerability exploit is at the heart of hacking and data breaches. Worms, viruses, malware, and a host of other attack types often rely on vulnerability exploit to infect, spread and perform the actions cyber criminals want. And yet, organizations are still not doing what they need to for patch management. Hackers are more often exploiting client side vulnerabilities and other vulnerabilities associated with 3rd party applications.

4. Careless employees

Careless and untrained insiders will continue to be a very serious threat to organizations in 2010. Insiders can be broken down into three categories: careless & untrained employees, employees that are duped or fall prey to social engineering type attacks, and malicious employees. Protecting a network and critical and sensitive data is done very differently for each type. Policies, procedures, training and a little technology can make a world of difference in reducing an organization's risk to careless insiders.

5. Mobile devices

Mobile devices have become a plague for information security professionals. There are worms and other malware that specifically target these devices such as the iPhone worm that would steal banking data and enlist these devices in a botnet. Theft is still a major cause of data breaches as mobile devices, especially laptops, are the main culprits. Tens of thousands of laptops are stolen each year and often these have sensitive data that require public disclosure as a data breach.

6. Social networking

Social networking sites such as Facebook, MySpace, Twitter and others have changed the way people communicate with each other, but these sites can pose serious threats to organizations. One main problem is that there is a trust component to these sites which makes them fertile ground for identity thieves. There is also a personal safety issue. Social networking sites are a stalker's dream come true. Social networking sites are breeding grounds for SPAM, scams, scareware and a host of other attacks and these threats will continue to rise.

7. Social engineering
Social engineering is always a popular tool used by cyber criminals and phishing is still a popular method for doing just that. In fact, these new venues make social engineering even more effective. This year will have an added measure of complexity when it comes to social engineering attacks. Beginning sometime mid-2010, domain names will be expanded to include Japanese, Arabic, Hindi and even Greek characters, and with all of these characters being available for domain names, no longer will looking at a domain help one determine if it's legitimate or not.

8. Zero-day exploits

Zero-day exploits are when an attacker can compromise a system based on a known vulnerability but no patch or fix exists, and they have become a very serious threat to information security. Zero-day vulnerabilities are being discovered in traditionally very secure protocols such as SSL and TLS. The zero-day vulnerability could also be in providers.

9. Cloud computing security threats

Using cloud based (i.e. Internet based) applications may not be as secure as once thought with many stories in 2009 regarding cloud based security issues. Many are calling for forced encryption to access "in the cloud" services. As cloud computing grows in popularity over the next few years, cloud security will become a very big issue.

10. Cyber espionage

Cyberespionage is a threat that's being heard more and more all the time and there have been a flood of stories in 2009 on this subject. Most of these incidents surround government bodies and agencies and therefore have not been a huge threat to most individual organizations. However, since cyber espionage has major implications for the government, it is a rising threat that must be closely monitored.


http://www.net-security.org/secworld.php?id=8709

Sunday, 12 February 2012

my business pop cake ball



WHAT IS POPCAKE????

Chocolate cake and cream cheese frosting mixed together and covered with candy coating


PROMOTION PRICE RM50(50PCS)!!