We have two teams from ICS for this event held at Ateneo de Manila University last December 13-15, 2015. It is good to have been part of this event again after a long break. Thanks to Sir Clinton Poserio, head coach of the Eliens team, for inviting me. The ICS alumni have been a great help in providing financial support. A team from National University of Singapore was the winner in the competition. The top team from the Philippines was from the Ateneo de Manila University. The contest website is here.
Pages - Menu
▼
Monday, December 25, 2017
Thursday, November 30, 2017
DEC{}DE 2017: Transforming Security Experience
We attended this one-day event sponsored by Trend Micro last Nov. 29. The morning session was devoted to keynote sessions and the afternoon on technical sessions which included a hands-on lab.
Majority of the talks focused on the modern threats and attack approaches. The speakers also presented interesting statistics on the security landscape. With the growing security threats, the speaker from FBI urged the cooperation among the industry, government, and the academe. A common attack nowadays is the Business Email Compromise (BEC) wherein employees are subjected to phishing attacks resulting to the spread of malware, particularly ransom ware. With the growing popularity of the crypto-currencies, attackers are also taking advantage of user resources for mining without their consent. There were also talks on cloud security(Amazon) and application of machine learning techniques to security(Microsoft). A final takeaway from the event is that "security is a habit.".
Majority of the talks focused on the modern threats and attack approaches. The speakers also presented interesting statistics on the security landscape. With the growing security threats, the speaker from FBI urged the cooperation among the industry, government, and the academe. A common attack nowadays is the Business Email Compromise (BEC) wherein employees are subjected to phishing attacks resulting to the spread of malware, particularly ransom ware. With the growing popularity of the crypto-currencies, attackers are also taking advantage of user resources for mining without their consent. There were also talks on cloud security(Amazon) and application of machine learning techniques to security(Microsoft). A final takeaway from the event is that "security is a habit.".
Wednesday, November 1, 2017
A list of good-sounding adjectives and word for titles and presentations
(Last updated: 2022-11-28)
- sustainable
- inclusive
- comprehensive
- novel
- modern
- exclusive
- multidisciplinary
- interdisciplinary
- collaborative
- pioneering
- innovative
- modern
- monumental
- scientific
- professional
- superior
- *-proof (ex. hack-proof)
- *-resistant (ex. tamper-resistant)
- *-preserving (ex. privacy-preserving)
- free
- tested
- timely
- unparalleled
- profitable
- encompassing
- generic
- secure
- safe
- efficient
- effective
- revolutionary
- futuristic
- forward-looking
- latest
- advanced
- interactive
- user-friendly
- infinite
- certified
- complete
- emerging
- excellent
- sensational
- practical
- powerful
- proven
- sizable
- reliable
- non-deterministic
- non-intrusive
- (more to follow)
NCITE 2017 Experience
This year's NCITE was held at Leyte Normal University, Tacloban City, Leyte. We presented a paper on distance estimation using RSSI for drones. Together with me are four colleagues from ICS. The food was good and we really enjoyed the presentations.
Saturday, July 1, 2017
CHED Centers of Excellence in IT (Department Websites)
Below is a list of the department websites of CHED's CoE in IT released in 2015.
- Angeles University Foundation
- University of the Philippines Los Banos
- Ateneo de Naga University
- Cebu Institute of Technology University
- University of the Philippines Cebu
- Mindanao University of Science and Technology
- Asia Pacific College
- Ateneo de Manila University
- De La Salle University
- National University
- Technological Institute of the Philippines - Manila
- Technological Institute of the Philippines - QC
- University of the Cordilleras
- Silliman University
Reference: CHED CMO No. 38 2015
Thursday, June 29, 2017
Creating a USB drive Windows 7 installer from Ubuntu 16.04
If you have an .iso file for the installer, do the following:
1. Mount the installer .iso using loopback device
#mount win7.iso /mnt
2. Identify the device name in linux of your USB drive (ex. /dev/sdc)
#fdisk -l
3. Open gparted on the USB drive device
#gparted /dev/sdc
4. In gparted delete all partitions then do the following:
a. Create a new partition table, select type: 'msdos'
b. Create an NTFS partition
c. Through "Manage flags" option, check 'boot'
d. Exit from gparted
5. Copy all the contents of /mnt to the root of the newly prepared USB drive
6. Unmount the newly prepared USB drive (which was mounted automatically by the Ubuntu file manager when inserted earlier)
6. Install ms-sys (https://launchpad.net/~lenski/+archive/ubuntu/ms-sys/+files/ms-sys_2.2.0-1ubuntu1_amd64.deb)
7. Install the boot sector
#ms-sys -7 /dev/sdc
8. Unmount /dev/sdc
9. Umount /mnt
1. Mount the installer .iso using loopback device
#mount win7.iso /mnt
2. Identify the device name in linux of your USB drive (ex. /dev/sdc)
#fdisk -l
3. Open gparted on the USB drive device
#gparted /dev/sdc
4. In gparted delete all partitions then do the following:
a. Create a new partition table, select type: 'msdos'
b. Create an NTFS partition
c. Through "Manage flags" option, check 'boot'
d. Exit from gparted
5. Copy all the contents of /mnt to the root of the newly prepared USB drive
6. Unmount the newly prepared USB drive (which was mounted automatically by the Ubuntu file manager when inserted earlier)
6. Install ms-sys (https://launchpad.net/~lenski/+archive/ubuntu/ms-sys/+files/ms-sys_2.2.0-1ubuntu1_amd64.deb)
7. Install the boot sector
#ms-sys -7 /dev/sdc
8. Unmount /dev/sdc
9. Umount /mnt
Friday, June 23, 2017
CNSEC 2017
In line with the offering of a new Special Topics course on Computer and Network Security, SRG hosted the Computer and Network Security 2017(CNSEC2017) Workshop last June 17-18, 2017. The objective of the workshop is to provide computer security related hands-on activities for the ICS faculty. SRG prepared two activities, one on buffer overflow exploitation and another on SQL injection. Contests were held to test the participants knowledge. Winners of the “Olympus has fallen” stack overflow exploitation contest are Mam Maan, Sir TJ, and Miguel. Clinton won the “Attack on Titan” SQL injection contest.
Wednesday, June 7, 2017
Setting up a Drone Programming Environment using DroneKit on Windows 7
- Install for all users
- Destination directory: C:\Python2.7
- Add python.exe to Path
- >python -V
- >pip install virtualenv
- >md SRG-Bots
- >cd SRG-Bots
- >virtualenv dronekit_env
- >dronekit_env\Scripts\activate.bat
- >pip install dronekit dronekit-sitl mavproxy wget
- >dronekit_env\Scripts\dronekit-sitl.exe copter-3.3
- >cd SRG-Bots
- >dronekit_env\Scripts\activate.bat
- >python dronekit_env\Scripts\mavproxy.py --master tcp:127.0.0.1:5760 --sitl 127.0.0.1:5501 --out 127.0.0.1:14550 --out 127.0.0.1:14551
- >cd SRG-Bots
- >dronekit_env\Scripts\activate.bat
- >python
- >>>import wget
- >>>wget.download('https://github.com/dronekit/dronekit-python/raw/master/examples/simple_goto/simple_goto.py')
- >>>quit()
- >python simple_goto.py --connect "udp:127.0.0.1:14551"
Thursday, April 6, 2017
SenseDev'17 Experience
Wednesday, April 5, 2017
PCSC 2017 Experience
The conference was held at the University of San Carlos Talamban Campus in Cebu City last March 16-18, 2017. The venue for the plenary sessions is nice and the food was great. There were a lot of student participants also. Several pre-conference workshops were hosted by different schools. I attended the Women in Computing workshop which featured talks by some of the top women in computing from the Philippines. The paper presentations were divided into different tracks. I attended the Computer Networks and Cloud Computing where we presented our paper. There were six from ICS who attended the conference. The best paper for the conference came from National University.
Friday, March 10, 2017
Encrypting home directory in Ubuntu 16.04 after install
I will be traveling so I decided to encrypt my home directory just in case my laptop is lost or stolen.
- Log in as target user
- Install required packages
- sudo apt-get install ecryptfs-utils
- Create a temporary admin user
- Log out target user
- Log in as temporary admin user
- Encrypt target user home directory
- sudo ecryptfs-migrate-home -u target_user
- Encrypt swap partition
- sudo ecryptfs-setup-swap
- Log out temporary admin user
- Log in as target user
- Record encryption passphrase
- ecryptfs-unwrap-passphrase
- Reboot then log in as target user. Check if everything is working.
- Clean up by removing the backup folder and temporary admin user.