CPF website and e-services will not be available

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
#31
(12-11-2013, 01:58 PM)Ben Wrote:
(12-11-2013, 09:20 AM)Temperament Wrote: Of course i made Computershare.com collect the call. Just imagine i have to pay for the call. It's a small bomb to me. It's very funny to me, Computershare USA doesn't believe in solving problem through email. Can email be encrypted? Why the extra cost of long distance call?

There are many different types of International calling card easily available that costs about $10 each and allow you to make a few hundred minutes of overseas call, depending on which country you are calling. This will bypass the expensive IDD call. Of all the cards I have tried, Phoenix card has the best reception. With this, you can call and chit chat with Computershare USA as often and as long as you like Big Grin

http://www.phoenixcomms.com.sg/new/produ...xcard.aspx
Thanks.
WB:-

1) Rule # 1, do not lose money.
2) Rule # 2, refer to # 1.
3) Not until you can manage your emotions, you can manage your money.

Truism of Investments.
A) Buying a security is buying RISK not Return
B) You can control RISK (to a certain level, hopefully only.) But definitely not the outcome of the Return.

NB:-
My signature is meant for psychoing myself. No offence to anyone. i am trying not to lose money unnecessary anymore.
Reply
#32
(12-11-2013, 02:18 PM)yeokiwi Wrote:
(12-11-2013, 02:11 PM)valueinvestor Wrote: If he was arrested on 04/11, then the one who hacked PM and Istana websites should be a diffierent fellow ?

Yes. From the statements by police. Five other men/women were arrested for defacing gov websites.
Anyway, traps were probably laid even before the "messiah" was caught. So, catching those lousy/non-pro hackers was a piece of cake.

Some dumb asses just happily joined in the fun and now ended up in police station.

Many people do not understand the implication of being caught using home computers to commit crimes. All the electronics devices(PC, notebook, ipad, tablets or whatever) will be confiscated by police and send for forensic scanning.

So, if you got porn... 1 more charge.
involve in illegal online betting ... 1 more charge
using commercial software without licenses.. 1 more charge by police and x no. of charge possible by IP owners.
illegal moneylending...??
i thought they are "International Hackers". In a Little Red Dot where can you hide? Even Fts know that you can run but nowhere to hide. And they are all Singaporeans? Are they potential IMH patients or what?
WB:-

1) Rule # 1, do not lose money.
2) Rule # 2, refer to # 1.
3) Not until you can manage your emotions, you can manage your money.

Truism of Investments.
A) Buying a security is buying RISK not Return
B) You can control RISK (to a certain level, hopefully only.) But definitely not the outcome of the Return.

NB:-
My signature is meant for psychoing myself. No offence to anyone. i am trying not to lose money unnecessary anymore.
Reply
#33
I recalled an incident happened long time ago in Singapore

A group of scholar engineers from a GLC, invented a "hacker-proof" storage system. They are so confident that a global challenge was offerred to hackers. In fact, I was convinced then. The result? The system was hacked within minutes after the system was up and online.

The moral of the story? The international hackers were more capable than we thought. Those caught are amateurs.
“夏则资皮,冬则资纱,旱则资船,水则资车” - 范蠡
Reply
#34
(13-11-2013, 03:16 PM)CityFarmer Wrote: I recalled an incident happened long time ago in Singapore

A group of scholar engineers from a GLC, invented a "hacker-proof" storage system. They are so confident that a global challenge was offerred to hackers. In fact, I was convinced then. The result? The system was hacked within minutes after the system was up and online.

The moral of the story? The international hackers were more capable than we thought. Those caught are amateurs.

You are right, the real hackers are public shy they won't usually announce when they are coming best don't piss them off or tempt them. Real attack are usually ddos (distributed denial of service) imagine you are trying to access a website or service you find slow because of heavy network traffic but how do you if it is really network traffic or somebody created a massive traffic bomb and dumped it on your site? Very hard to determine.

it was what happen to wikileaks when us government tried to shut them down using ddos. They created a massive massive traffic and just re-directed it on wikileaks the result was system was overwhelmed with request could not respond so nobody could access to it.

Other day 5th Nov I was at atm machine, behind this lady waited almost 10 minutes. I was thinking what she doing why so long still not done so I see and ask lady she say she trying to do transfer but is so freaking slow I immediately suspected either companies scanning their own network for vulnerability or kena ddos attack.
Reply


Forum Jump:


Users browsing this thread: 3 Guest(s)