Saturday, March 21, 2015

MVA Jump Start Technical Problem in March 20 (Rant alert)

So, what happened yesterday during the Jump Start that was happening live? Well, some stupid technical problems interrupted the FUCK OUT OF ME AND THAT JUMP START! Was the fault lying with my home network or perhaps the network at Microsoft that runs the Microsoft Virtual Academy service? WHY WAS THE CONNECTION LINK BETWEEN THESE GETTING BAD? You expected me to restart the home network and see if that technical stupidity was gone? NO, BECAUSE SOME OTHER IDIOTS AT HOME WERE NOT ASLEEP UNTIL 1AM-2AM+! Whoever GAVE me a bad luck like that surely DISRESPECTED ME! It didn't matter which device I used to stream the Jump Start as the technical stupidity continued from there. This in-excusable shit should stop!
I don't know what else can I say about what happened during that Jump Start that was played live but certainly, there weren't so much questions happening in the Q&A section and that the tweets I saw were making this Jump Start look controversial. However, this Jump Start can't be as controversial as other game development related MVA Jump Starts I had ever seen. And due to that stupidity I stated above, I missed some poll questions below the video player of the Jump Start but at least, I managed to obtain the slides and and entered the voucher while that technical problem persisted.
I don't know which one to blame for this occurance of this stupid technical problem, is it my home network or perhaps someone at Microsoft managing the network that is connected to the MVA system? This was unforgivable and unacceptable when that happened to me and it's really punishing to one of those sides! If everything is slow on my home network regardless of whichever website, that means, my home network is to blame. But the thing is, some of the websites are making the connection link completely ignorant between them and my home network. Do I blame the local or foreign ISP for that? Do I blame one of the sides as mentioned from the beginning of this paragraph for that? Well, that's kind of STUPID by mis-putting false accusations on one side without investigating the problem even deeper!
Even the recorded videos of that Jump Start will not count as the compensation for that unacceptable shit but as I missed so much parts of that Jump Start, I'll eventually get those videos and blog about that in two weeks or so. What a way to disrespect me or waste my time with these stupid interruptions! If this stupid technical shit happens in the next Jump Start I'm going to attend, then, the MVA network or whatever is likely to blame for being technically bulky.

Saturday, March 14, 2015

SWUG March Meetup

I'm sure that the security may have known that there may be events and other stuffs going on at the various companies in that building at One Marina Blvd. This month's meetup event is about the cybersecurity as well as the details on how cyber-crimes are tackled so there won't be anything about the cybersecurity concern at deeper level like those corrupted idiots at various companies doing some illegal spying on their own accord. The event was talking about how cyber-crimes were tackled by Microsoft Digital Crimes Unit which did some collaboration with the law enforcement and government agencies in order to track down cyber criminals and their command centers. Depending on how large the cyber criminal group is which may be somewhat situated in many nations, it may be a challenge to find all the command centers that operate those illegal activities.
Technical aspects of cybersecurity are what we know of and especially on how do we protect ourselves from cyber-attacks but outside of technology is the law enforcement type topic in which the speaker wasn't able to answer any technical questions related to cybersecurity. In addition, there might be famous news that popped up in the slides as a surprise to me as I had already seen the previous news like that prior to attending this meetup. Certain victims like Sony Pictures, Target and various bank and shop companies were the famous examples of the recent cyber-incidents and CEOs and CIOs are found to be really sensitive about the cybersecurity concerns. Anything compromised can land the company in deep trouble but finding and understanding the reasons on why would the cyber-penetrators do this and that may be a challenge.
Other mentioned stuffs included the fact that India and Indonesia are the most vulnerable South-East Asia countries according to the charts presented by the speaker but that's not to worry about other countries in South-East Asia as most of them are less vulnerable and it may be nearly rare to find simple security flaws nowadays. There might be cybersecurity awareness taking place in schools and I guess that privacy protection is one of the things I can add as part of the awareness like preventing illegal tracking and advertisements, using email services that are much safer as well as what to do and what not to do on the internet to be frank like privacy is not supposed to be an excuse for you to do bad stuffs online. Also, there might be differences between botnets and other various malwares in which the ones behind the botnet may spread it to various victim computers to do the attacks for them. The botnets may be hidden somewhere inside pirated software and media content so be on the lookout for that and if you're a pirate, your computer's simply screwed up without any knowledge so it's a serious advice to go genuine at all times.
Lastly, there's an app called Microsoft Events @ Microsoft which you can get from Itunes App Store and Google Play to see the upcoming events to attend to. Also, there is the Azure Global Bootcamp in which the Azure service is way too technically advanced for me and that I have no experience whatsoever. Even an 1-month trial isn't enough for me but sooner or later, I may have the ideas on things work with Azure and that I can list down the Azure plans like Virtualization, Backup and Recovery and Active Directory as other Azure components are aimed towards programmers in which they can manage, amend and develop apps for the Azure service, not IT Professionals. There's also Visual Studio Online which I first saw from the MVA Jump Start of Unity game development thingy.
Needless to say after the event, there's a suggestion form where you can suggest the next topic you want for the next event. Unfortunately, you will need a job if you want to suggest as the Company Name box is compulsory to fill in. The virtualization and security were already suggested by most of the group members the last time and it's posing me a difficulty on which topic to suggest. There has been mentions of cloud technology and I've been using various cloud services even today but the only senseful things about cloud technology by Microsoft nowadays will be Intune, Azure, Office 365, System Center for private cloud, Onedrive and of course, the private cloud version of Onedrive. Maybe there might be legacy elements of Windows Live Mesh data synchronization takes place in between computers but there was no online storage whatsoever. Even if there was one, the online storage might be separate from the Onedrive storage but the gladful thing is that Windows Live Mesh was completely ditched in favor of Onedrive and the new Remote Desktop which is for enterprise use unfortunately.

Monday, March 9, 2015

Know It, Prove It event

Taking Game Development challenge or whatever from Know It, Prove It event, I already made some major progress in various Jump Starts at MVA. But before that, I already made progress in the previous Jump Starts there and hell, this kind of event is sort of like the in-game event where you have to go deeper in the game and follow the event prerequisites in progressing on.
And this is the right time to talk about one of the controversial MVA Jump Starts regarding the Unity game development. Someone from Microsoft previously worked at that Comcrap/Shitcast or whatever you want to call it in a hateful way because people around the globe know how terrible and evil that US ISP is. Such a discovery of his public resume and profiles shown on social networking sites, MVA slides starring him. But the positive stuffs about him were that he had tons of previous professional experiences in software engineering including game development. That also includes some game development events he took part as well. What a controversial employee he is but you should be able to check out his stuffs if you're interested.
And after progressing in Game Development challenge, there are additional IT Professionals suited courses from that event to know from as the second challenge for me. Of course, I still have yet to do any contribution to that controversial Unity game development Jump Start by following the respective hosts on Twitter, going to their websites to see if there's anything interesting to know and obtain from for the sake of learning as well as to learn Unity game development the hard way.

uTorrent - CPU hogging for Bitcoin mining

OK, this is somewhat the silly idea uTorrent has come up with! Hogging people's CPU just to mine Bitcoins like that is like getting paid through advertisements in a worse way. At least, showing advertisements in the apps is already a good way to get paid but hogging anything like the CPU is a complete no-no. This is kind of like a freaking malware that does the hogging to various components of your machine. It may affect the performance like it happened to our computers in the past since the Windows XP days in which millions of computers were virus-infected back then in which there were tons of annoying spywares, adwares and other types of malwares everywhere on the screen, slowing down every computer like a weakling.
This is kind of TOTALLY BULLSHIT! Imagine some malware that hogs your computer hard drive non-stop besides the CPU. Every component has its own life-cycle unless you're some next-gen worker in some company who doesn't know various technical stuffs at all that you inject stupid bullshit like CPU hogging for money.
Such a standard security threat level is something we know of ever since the early 2000s and yet those at uTorrent don't know what this is or something. WHY IS SOMETHING EASY OR STANDARD FOUND SO DIFFICULT TO FOLLOW? Are they security noobs or something? And the last things to talk about are the fact that the whole Bitcoin mining process is transferred to the parent company, BitTorrent, so that they can get money that way. Overall, this idea isn't as stupid as the privacy violation ideas other corporations have and cyber-security enthusiasts already know how important the security is.
Last thing is that I don't do torrenting whatsoever. I aim for buying genuine stuffs as my recommendation and I care for how the companies make money from whatever stuffs they make in genuine ways.

Phone numbers for Twitter account access on Tor

Taking down trolls is probably one good thing from Twitter although it can't be the same for YouTube nowadays if you want to report them there as there might still be forced Google+ integration that posed the difficulty in doing so. Another warning is that actions will be taken against those who try to abuse certain users on Twitter in various ways so you should take note of that and especially that even Tor users happen to be accessing Twitter in certain ways like nobody can know who does all that trolling or abuse to some user or company on Twitter.
Using phone numbers or some extraordinary list, this may be how Tor users can be tracked down because there's already a serious controversy that has been on-going nowadays like the service is used for various criminal activities for instance in addition to good Tor users who use the service for the sake of privacy which is a good move.
One thing to keep in mind is that surrendering anything like that defeats the purpose of privacy but the controversy is already the reason on why various governments want the Tor security completely defeated so that they can track down those evildoers and cyber-criminals as we know of. Also, it may be difficult for Twitter to take down repeat offenders that use this service as the IPs can't be easily recorded on the list or something for the sake of privacy. Talk about over-protective if you ask and many websites like Twitter, Facebook, YouTube, Google, etc. don't seem to play nice if you're trying to sign in to various accounts there on Tor browser. This is like the service already knew which services have been tracking users ever since and I still don't recommend this browser for regular usage.

Tuesday, March 3, 2015

Google+ split up into parts of services

Those saying that Google+ no longer exists may be glad but then there are still silly defenders of this service up there. And in fact, that service to me surely has done things a little bit worse as if we are not able to report a bunch of useless troll comments on YouTube and Google Plus probably due to the forced integration of that service and that the extensions for the web browsers are applied. Without the extension stuffs, we should be able to report those comments but then, it can leave us seriously vulnerable to illegal data collection through advertisements on YouTube. But, with Google+ being split into various popular parts of the services like the Google Hangout, Photo Streams, etc. I don't know if Google may have done things right with YouTube service again as if we are able to interact with the YouTube comments again with the web browser extensions applied like things may be quite smooth.
Perhaps, next time I post my blog post or YouTube video, it will be automatically tweeted and not publicized to Google Plus although I have some unexpected amount of momentum there. How did people visit me there? Well, who the hell cares for Google+ when other social networking sites are more popular than that. And thanks to that for being some kind of a technical discovery back then and especially for other services which no longer existed such as Google Reader, Windows Live Mesh cloud desktop and some other Google services which were less popular as well.