| I dislike a person who is boastful, narcissist and selfish! Hey, you! Stay away from me! |
Translate
Saturday, November 17, 2012
Friday, November 16, 2012
I think Ahok is a good leader...
via jakartaglobe.com A 46-minute video showing Jakarta Deputy Governor Basuki Tjahaja Purnama getting tough on public works officials has gone viral on YouTube, getting more than a million views since it was posted a week ago. |
Look what I found on TuneIn !
The China Syndrome - TIME
http://www.time.com/time/magazine/article/0,9171,2129409,00.html
Sent from Samsung Mobile
The Next Generation | Meet the Men Who Will Rule China | TIME.com
http://world.time.com/2012/11/15/chinas-new-leaders-meet-the-men-who-will-rule/
Sent from Samsung Mobile
Thursday, November 15, 2012
Why Obama’s trip to Burma is such a big deal
from Wahington Post by Mark Fisher This week, the White House announced that President Obama will visit Burma (also known as Myanmar), long an international pariah that has just recently begun to reform, later this month. He will be the first president to do so, moving with astonishing speed on building ties with this strategically located nation long seen as one of the world's worst dictatorships. How fast, exactly? Let's put it in context, comparing it with three of the most famous cases of U.S. rapprochement since the end of the Cold War. The U.S. has tended to move slowly when it comes to rapprochement with rogue states. First the country opens, rolling back the nasty dictatorship and aggressive foreign policy that got it isolated in the first place, then there are a few years of overtures. Finally, if the rogue state becomes sufficiently friendly, the U.S. signals its renewed ties with a visit from the secretary of state or even the president. When South African President F.W. de Klerk began to roll back apartheid in early 1990, releasing Nelson Mandela from prison and lifting the ban on the African National Congress that now leads the country, rapprochement with America came slowly. The U.S. sent Secretary of State James Baker to Cape Town and Johannesburg that year, but didn't begin to lift sanctions until a year later, when South Africa dismantled its nuclear program. It wasn't until after de Klerk oversaw a peaceful, democratic transition – and shared a Nobel Peace Prize with Mandela – that the U.S. offered $600 million in aid. And it wasn't until 1998 that President Bill Clinton, by then fast friends with then-President Mandela, visited South Africa. Time from South Africa's opening to secretary of state visit: months. Time to presidential visit: eight years. In October 2000, just days after a popular revolution ousted Yugoslav President Slobodan Milošević, the U.S. announced it would reestablish its diplomatic ties to the European dictatorship as it transitioned to democracy. By January, Washington dropped its nine-year-old sanctions, the start of a rapprochement that saw Yugoslavia (now Serbia) arrest former regime members and divide its borders. But no U.S. president has visited the country since 1980, and it was not until 2010 that Secretary of State Hillary Rodham Clinton traveled to Belgrade. Time from Serbia's opening to secretary of state visit: 10 years. Time to presidential visit: 12 years and running. Libyan leader Moammar Gaddafi probably ended up regretting his decision to resign his nuclear program in 2003 and begin cooperating with the U.S. on counterterrorism, but at the time it probably seemed smart. The U.S. lifted sanctions the next year, reestablished its Tripoli embassy in 2006, lifted its "state sponsor of terror" designation that same year, and sent Secretary of State Condoleezza Rice for a very creepy official visit in 2008, the first since 1953. No president has ever visited the country. Time from Libya's opening to secretary of state visit: five years. Time to presidential visit: nine years and running. What about Burma? The country's reform began with a bang in March 2011, when the rulers dissolved the half-century-old military junta and transitioned to a civilian government. Burma has gradually democratized (though its commitment to free elections remains largely untested), freed hundreds of political prisoners, relaxed restrictions and, perhaps most significantly for Washington, moved away from China, its longtime patron. Hillary Rodham Clinton traveled to meet with President Thein Sein and others that November, making her the second secretary of state to go, and Obama will become the first sitting president to ever go. The U.S. has lifted crippling sanctions, allowing foreign investment to flood in. Time from Burma's opening to secretary of state visit: eight months. Time to presidential visit: 20 months. That might be a land-speed record for post-Cold War rapprochement. Some during and immediately after the Cold War were faster, but the coups and counter-coups and shifting alliances were unique to that bipolar era. But what's driving Obama administration's remarkable enthusiasm for opening Burma right now? It seems largely to be part of the administration's mission to earnestly "pivot" to Asia; the president, on this trip, will also become the first to visit Cambodia. One big part of this strategy that doesn't get discussed much is the effort to integrate Southeast Asian countries, which are not thrilled about China's rising influence but need some help uniting against the neighboring giant. Perhaps the administration sees an opening to assert regional leadership now, while China's diplomatic outreaches remain clumsy and unconvincing. But there's another message that the rapid U.S. detente with Burma sends, whether deliberately or not: rogue states that open up might be able to expect rewards from the Americans, and quickly. The administration's willingness to let bygones be bygones with Burma, to work with the ruling regime instead of pushing its top figures into international criminal courts, and to reward its reforms "action for action," as the diplomats put it, would seem to establish some very tempting incentives for other rogue states. To be sure, each rogue state is its own complicated case. The U.S. has a lot less baggage with Burma than it does with, say, Iran, so it's easier for Washington to put the past aside. And the Burma relationship is also less encumbered by domestic U.S. politics or by interest groups that might oppose a too-rapid opening. Still, you have to wonder how it looks from Caracas or Riyadh or even Tehran. |
Monday, November 12, 2012
heavy turnover expected in Obama's Cabinet
Now that President Obama has secured a second term, the official Washington speculation machine -- and, no, that doesn't actually exist (or does it?) -- has turned to the heavy turnover expected in his Cabinet. While only Secretary of State Hillary Clinton has made clear she plans to leave early in the Obama second term, Treasury Secretary Tim Geithner has also clearly suggested he is on his way out, and Attorney General Eric Holder has been noncommittal of late about his future plans.CIA Director David Petraeus' stunning resignation on Friday creates another high-profile opening (although not a Cabinet-level position) for the president to fill. While those inner Cabinet jobs will draw the lion's share of attention, it's likely there will be more turnover in secondary Cabinet positions too, if for no other reason than the Obama Cabinet has seen historically low levels of turnover in the first term. One example: The Commerce Department has lacked a top official since the resignation of John Bryson following a car accident in June. Below is a baseline handicapping of who might step into the major Cabinet jobs when they come open. Remember: The choice is ultimately up to Obama and no one else, which makes much of the talk about whom he might pick decidedly speculative. But, that's never stopped us before! Away we go! * State: Following in the footsteps of Clinton, one of the best-known and most well-respected politicians/diplomats in the world, is no easy task. (Clinton continues to play somewhat coy about what she'll do after State but has left little doubt she's leaving as the country's top diplomat.) Massachusetts Sen. John Kerry clearly pines for the job, but to pick Kerry would mean a special election to replace him in the Bay State in early 2013 with soon-to-be former senator Scott Brown (R) lurking. Democrats' surprising gains in the Senate may give Obama the wiggle room to pick Kerry -- special election be damned! -- but it's clearly a consideration. Other names mentioned include U.S. Ambassador to the United Nations Susan Rice and National Security Adviser Tom Donilon. * Treasury: Given the still-struggling state of the economy, Obama's pick to succeed Geithner could well be the most important one he makes heading into a second term. White House chief of staff Jack Lew seems to have the inside track, but if he is chosen, Obama would have to find a new chief -- his fourth during his time in office. Former Clinton Administration official -- and two-time failed North Carolina Senate candidate -- Erskine Bowles appears to be a rising choice thanks to his work on the eponymous debt commission. * Justice: Holder's unwillingness to commit to a future in the Cabinet coupled with the stress that comes with being among the most high profile -- if not the highest profile -- member of any Cabinet has led many to conclude he is on his way out. If that happens, Department of Homeland Security's Janet Napolitano would badly want the job and has a resume -- elected to two terms as governor of Arizona, former state attorney general -- that would strongly recommend her. Of course, putting Napolitano at Justice would create another opening at DHS for the president to fill. Other names mentioned include Massachusetts Gov. Deval Patrick and Rhode Island Sen. Sheldon Whitehouse. Aides to Patrick and Whitehouse both deny their bosses want the job but that, of course, is standard operating procedure in the Cabinet shuffle. * Defense: Leon Panetta split time during Obama's first term -- serving as CIA Director and then Secretary of Defense. There's widespread speculation that he wants to return to his native California sometime in the early(ish) part of 2013. If Panetta does head west, two names are regarded as the leading replacements: formerUnder Secretary of Defense for Policy Michele Flournoy and Deputy Secretary of Defense Ashton Carter. If Flournoy is the pick, she would be the first female Secretary of Defense ever. (For more on Flournoy, read Emily Wax's 2011 profile of her.) Obama wins Florida: Floridawas officially called for Obamaon Saturday, officially handing him a 332-206 electoral vote win. The call wasn't surprising, given Obama held a small but firm lead in Florida ever since Election Day, but it does mean he swept basically every tossup state in the country on Tuesday and has a sizable Electoral College win to show for it. Obama came just 33 electoral votes shy of his 2008 showing, when he also carried Indiana, North Carolina and one electoral vote in Nebraska. Fixbits: Sen. Tom Coburn (R-Okla.) says Republicans lost because theydidn't explain what they're for. Bill Kristol becomes the latest conservative to call for Republicans to budge on taxes. Top Obama adviser David Axelrod says he likes what he's hearing from House Speaker John Boehner (R-Ohio). Senate Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.)says she got no advance noticeof Petraeus's resignation and admission of an affair. Sources tell ABC that Petraeus has told people close to him that his affair with Paula Broadwell started after he left the army in August 2011. Former congressman Jay Inslee (D) wasdeclared the winner of the Washington state governor's raceon Saturday. Rep. Allen West (R-Fla.)trails by more than 2,000 votesin the final count from Florida's 18th district, a margin that is outside the bounds for a recount. But his campaign is stillexploring legal avenues. Rep. Jesse Jackson Jr.'s (D-Ill.) plea deal could include jail time and his resignation. Must-reads: "FBI probe of Petraeus triggered by e-mail threats from biographer, officials say" -- Sari Horwitz and Greg Miller, Washington Post "The Sins Of General DavidPetraeus" -- Michael Hastings, BuzzFeed |
Abbas tells Obama he'll seek Palestinian UN upgrade, defying U.S.
http://m.yahoo.com/w/legobpengine/news/abbas-tells-obama-hell-seek-palestinian-un-upgrade-014334302.html?.b=world&.ts=1352699502&.intl=US&.lang=en
Sent from Samsung Mobile
Syria's opposition groups strike unity deal against Assad
http://m.yahoo.com/w/legobpengine/news/assad-opponents-agree-unite-224806581.html?.b=world&.ts=1352699502&.intl=US&.lang=en
Sent from Samsung Mobile
Sunday, November 11, 2012
Crisis or boost? How David Petraeus' resignation from the CIA could be good for Barack Obama - Telegraph
http://www.telegraph.co.uk/news/worldnews/barackobama/9668701/Crisis-or-boost-How-David-Petraeus-resignation-from-the-CIA-could-be-good-for-Barack-Obama.html
Sent from Samsung Mobile
David Petraeus resignation: the fall of a scholar-soldier - Telegraph
http://www.telegraph.co.uk/news/worldnews/us-politics/9668778/David-Petraeus-resignation-the-fall-of-a-scholar-soldier.html
Sent from Samsung Mobile
Spy chief Gen David Petraeus, his 'embedded' biographer and the FBI email trawl that exposed their affair - Telegraph
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/9669532/Spy-chief-Gen-David-Petraeus-his-embedded-biographer-and-the-FBI-email-trawl-that-exposed-their-affair.html
Sent from Samsung Mobile
Chrome was the least susceptible to attacks
| source: NYT Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self. It's hard to maintain peace of mind when hackers remind me every day, all day, just how easy it is to steal my personal data. Within weeks, I set up unique, complex passwords for every Web site, enabled two-step authentication for my e-mail accounts, and even covered up my computer's Web camera with a piece of masking tape — a precaution that invited ridicule from friends and co-workers who suggested it was time to get my head checked. But recent episodes offered vindication. I removed the webcam tape — after a friend convinced me that it was a little much — only to see its light turn green a few days later, suggesting someone was in my computer and watching. More recently, I received a text message from Google with the two-step verification code for my Gmail account. That's the string of numbers Google sends after you correctly enter the password to your Gmail account, and it serves as a second password. (Do sign up for it.) The only problem was that I was not trying to get into my Gmail account. I was nowhere near a computer. Apparently, somebody else was. It is absurdly easy to get hacked. All it takes is clicking on one malicious link or attachment. Companies' computer systems are attacked every day by hackers looking for passwords to sell on auctionlike black market sites where a single password can fetch $20. Hackers regularly exploit tools like John the Ripper, a free password-cracking program that use lists of commonly used passwords from breached sites and can test millions of passwords per second. Chances are, most people will get hacked at some point in their lifetime. The best they can do is delay the inevitable by avoiding suspicious links, even from friends, and manage their passwords. Unfortunately, good password hygiene is like flossing — you know it's important, but it takes effort. How do you possibly come up with different, hard-to-crack passwords for every single news, social network, e-commerce, banking, corporate and e-mail account and still remember them all? To answer that question, I called two of the most (justifiably) paranoid people I know, Jeremiah Grossman and Paul Kocher, to find out how they keep their information safe. Mr. Grossman was the first hacker to demonstrate how easily somebody can break into a computer's webcam and microphone through a Web browser. He is now chief technology officer at WhiteHat Security, an Internet and network security firm, where he is frequently targeted by cybercriminals. Mr. Kocher, a well-known cryptographer, gained notice for clever hacks on security systems. He now runs Cryptography Research, a security firm that specializes in keeping systems hacker-resistant. Here were their tips: FORGET THE DICTIONARY If your password can be found in a dictionary, you might as well not have one. "The worst passwords are dictionary words or a small number of insertions or changes to words that are in the dictionary," said Mr. Kocher. Hackers will often test passwords from a dictionary or aggregated from breaches. If your password is not in that set, hackers will typically move on. NEVER USE THE SAME PASSWORD TWICE People tend to use the same password across multiple sites, a fact hackers regularly exploit. While cracking into someone's professional profile on LinkedIn might not have dire consequences, hackers will use that password to crack into, say, someone's e-mail, bank, or brokerage account where more valuable financial and personal data is stored. COME UP WITH A PASSPHRASE The longer your password, the longer it will take to crack. A password should ideally be 14 characters or more in length if you want to make it uncrackable by an attacker in less than 24 hours. Because longer passwords tend to be harder to remember, consider a passphrase, such as a favorite movie quote, song lyric, or poem, and string together only the first one or two letters of each word in the sentence. OR JUST JAM ON YOUR KEYBOARD For sensitive accounts, Mr. Grossman says that instead of a passphrase, he will randomly jam on his keyboard, intermittently hitting the Shift and Alt keys, and copy the result into a text file which he stores on an encrypted, password-protected USB drive. "That way, if someone puts a gun to my head and demands to know my password, I can honestly say I don't know it." STORE YOUR PASSWORDS SECURELY Do not store your passwords in your in-box or on your desktop. If malware infects your computer, you're toast. Mr. Grossman stores his password file on an encrypted USB drive for which he has a long, complex password that he has memorized. He copies and pastes those passwords into accounts so that, in the event an attacker installs keystroke logging software on his computer, they cannot record the keystrokes to his password. Mr. Kocher takes a more old-fashioned approach: He keeps password hints, not the actual passwords, on a scrap of paper in his wallet. "I try to keep my most sensitive information off the Internet completely," Mr. Kocher said. A PASSWORD MANAGER? MAYBE Password-protection software lets you store all your usernames and passwords in one place. Some programs will even create strong passwords for you and automatically log you in to sites as long as you provide one master password. LastPass, SplashData and AgileBits offer password management software for Windows, Macs and mobile devices. But consider yourself warned: Mr. Kocher said he did not use the software because even with encryption, it still lived on the computer itself. "If someone steals my computer, I've lost my passwords." Mr. Grossman said he did not trust the software because he didn't write it. Indeed, at a security conference in Amsterdam earlier this year, hackers demonstrated how easily the cryptography used by many popular mobile password managers could be cracked. IGNORE SECURITY QUESTIONS There is a limited set of answers to questions like "What is your favorite color?" and most answers to questions like "What middle school did you attend?" can be found on the Internet. Hackers use that information to reset your password and take control of your account. Earlier this year, a hacker claimed he was able to crack into Mitt Romney's Hotmail and Dropbox accounts using the name of his favorite pet. A better approach would be to enter a password hint that has nothing to do with the question itself. For example, if the security question asks for the name of the hospital in which you were born, your answer might be: "Your favorite song lyric." USE DIFFERENT BROWSERS Mr. Grossman makes a point of using different Web browsers for different activities. "Pick one browser for 'promiscuous' browsing: online forums, news sites, blogs — anything you don't consider important," he said. "When you're online banking or checking e-mail, fire up a secondary Web browser, then shut it down." That way, if your browser catches an infection when you accidentally stumble on an X-rated site, your bank account is not necessarily compromised. As for which browser to use for which activities, a study last year by Accuvant Labs of Web browsers — including Mozilla Firefox, Google Chrome and Microsoft Internet Explorer — found that Chrome was the least susceptible to attacks. SHARE CAUTIOUSLY "You are your e-mail address and your password," Mr. Kocher emphasized. Whenever possible, he will not register for online accounts using his real e-mail address. Instead he will use "throwaway" e-mail addresses, like those offered by 10minutemail.com. Users register and confirm an online account, which self-destructs 10 minutes later. Mr. Grossman said he often warned people to treat anything they typed or shared online as public record. "At some point, you will get hacked — it's only a matter of time," warned Mr. Grossman. "If that's unacceptable to you, don't put it online." A version of this article appeared in print on November 8, 2012, on page B8 of the New York edition with the headline: How to Devise Passwords That Drive Hackers Away. |
Saturday, November 10, 2012
General David Petraeus’s Rules for Living - Newsweek and The Daily Beast
http://www.thedailybeast.com/newsweek/2012/11/04/general-david-petraeus-s-rules-for-living.html
Sent from Samsung Mobile
China's congress reveals 'an elite from another planet'
China's congress reveals 'an elite from another planet'
http://gu.com/p/3byan
Sent from Samsung Mobile
Friday, November 09, 2012
At Anika Hotel
Sent from my BlackBerry® smartphone from Sinyal Bagus XL, Nyambung Teruuusss...!


