Asia-America Gateway (AAG)

The Asia-America Gateway (AAG) is a 20,000-kilometre (12,000 mi) long submarine communications cable system, connecting South-East Asia with the mainland of the United States, across the Pacific Ocean via Guam and Hawaii. [1][2]

The cable is capable of delivering up to 2.88 Tbit/s (US-Hawaii & Hong Kong-South East Asia) and 1.92 Tbit/s (Hawaii-Hong Kong). The cable was ready for service on November 10, 2009.[3]

Development of the AAG cable system was funded, at a cost of $500 million USD,[2] by 19 partners: The Authority for Info-Communications Technology Industry of Brunei Darussalam, AT&T (USA), BayanTel (Philippines), Bharti (India), British Telecom Global Network Services (UK), CAT Telecom (Thailand), Telkom Indonesia (Indonesia), ETPI(Philippines), FPT Telecom (Vietnam), Ezecom/Telcotech (Cambodia), Indosat (Indonesia), PLDT (Philippines), Saigon Postal Corporation (Vietnam), StarHub (Singapore),Telekom Malaysia, Telstra (Australia), Telecom New Zealand, Viettel (Vietnam), and the Vietnam Posts and Telecommunications Group. The cable has landing points at the USA, Hawaii, Guam, Philippines, Hong Kong, Malaysia, Singapore, Thailand, Brunei and Vietnam.


On AAG development read more here:


Home> Technology Sony Hack: FBI Director Speaks About Evidence Pointing to North Korea

​Jan 7, 2015, 1:48 PM ET

The unprecedented hack that cost Sony millions of dollars and exposed private communications had North Korea‘s fingerprints all over it, according to FBI Director James Comey.

Speaking at the International Conference on Cyber Security at Fordham University today in New York City, Comey revealed for the first time that the FBI saw IP addresses previously used by North Korea.

Comey also cited the similarity of malware used in prior cyber-attacks.

Sony CEO Kazuo Hirai Speaks Out at International CES About Hack

How the Sony Hack Is Changing the Way I Work

US Slaps Sanctions on North Korea After Sony Hack

"Some serious folks have suggested that we’ve got it wrong," he said, noting that there were other sources and methods he could not reveal but were used by the FBI in their investigation.

"There is not much in life I have high confidence about," Comey added, defending the conclusion of federal officials that North Korea was responsible for the attack. "I have very high confidence in that attribution"

Comey’s remarks come just days after the United States levied new sanctions on North Korean officials and its defense industry.

Earlier this week, Sony’s CEO, Kazuo Hirai, broke his silence at the 2015 International Consumer Electronics Show in Las Vegas, where he began his presentation by addressing the difficult few weeks his company had faced.

"I think it would be remiss if I didn’t mention Sony Pictures Entertainment and the comedy movie ‘The Interview,’" Hirai said. "Freedom of speech, freedom of expression, freedom of association, those are very important lifelines of Sony … and our business."


Cisco to Lay off up to 6,000 Workers

NEW YORK — Aug 13, 2014, 6:03 PM ET

Cisco said Wednesday that it will lay off up to 6,000 workers, or 8 percent of its workforce, as part of a restructuring.

The company, which makes routers, switches and software, said the layoffs will affect workers in operations around the world. The announcement was made during a conference call discussing its fiscal fourth-quarter earnings.

The San Jose, California-based company on Wednesday reported a 1 percent decline in profit, to $2.25 billion, as revenue dipped to $12.36 billion from $12.42 billion. Its adjusted earnings for the three months ended July 26, its fiscal fourth quarter, came to 55 cents per share, which was two cents more than analysts expected, according to Zacks Investment Research.

During the conference call, Chief Financial Officer Frank Calderoni said the company estimates pretax charges of up to $700 million, with about $250 to $350 million recorded in the current quarter, for the restructuring.

Shares fell 25 cents, or 1 percent, to $24.95 in after-hours trading. The stock has risen 12 percent this year.

What is Cloud Computing? Introduction to Cloud Service Models

What is a Cloud?

Depending on who you are talking to, you’ll get different answers to this question.

A technically savvy end-user might define cloud as the ability to store and access personal or business data on-demand, over the internet, without having to store it locally.

A business might define cloud as an IT infrastructure that can be rented on-demand, instead of purchasing IT equipment to run their enterprise business applications.

A stakeholder might define cloud as a flexible execution environment of resources involving one or more stakeholders and providing a metered service at multiple levels up to a specified quality benchmark.

A biologist might define cloud as small droplets of water combine to form a cloud.

The traditional method of purchasing and deploying your own servers, storage and networking equipment at your datacenter might not be cost effective under certain circumstances. It is also not possible for start-ups to quickly build their own scalable IT infrastructure. Cloud computing comes to rescue under these situations.

Cloud Service Models

The following are three high level service models in the cloud:

  1. SaaS (Software as a Service)
  2. PaaS (Platform as a Service)
  3. IaaS (Infrastructure as a Service)

Cloud Computing

SaaS – Software as a Service

SaaS service provider will allow you to use their application software. Depending on your requirement, they might allow access to only specific functionality of their application. In this model, service provider will take care of development, upgrade and maintenance of the software applications. In simple terms, you’ll be paying monthly to use their application software.

For example, which is a CRM application as a service. Basecamp which is project management application as a service.

PaaS – Platform as a Service

PaaS service provider will allow you to use their platform (Operating System, database, web servers, run time environments, etc), or specific stack of solutions as per your requirement. It is one more level up where access is raised to the system software. Service provider will be take care of the complete development or computing environment, and users will take care of developing their own applications or product on top of it. In simple terms, you’ll be paying monthly to use their platform and develop your own application on top of it.

For example, Google App Engine and Red Hat Open Shift.

IaaS – Infrastructure as a Service

IaaS Service provider will allow you to use their infrastructures including servers, network equipment, storage infrastructure, etc. It is one more level up where a complete infrastructure is provided to the user rather just an Operating environment or an application. In simple terms, you’ll be paying monthly to use their scalable and redundant IT infrastructure and run your own enterprise application on top of it.

For example, Google compute engine, Rackspace services, Amazon AWS.

IaaS model can be further classified in two categories:

  1. Software Infrastructure as a service: A stack of web development essentials on a dedicated virtual server
  2. Hardware Infrastructure as a service: A stack of environment with firewalls, storage, content delivery networks with a dedicated server

Cloud Service Users

Due to the differences in types of services offered in the above three models, each of them are targeted for different users and skill-sets as explained below:

  1. SaaS : Non-technical business users are the primary users of this model. These are primarily general purpose application software that are easy to use, rich in application functionality for a particular business domain.
  2. PaaS : Application development users (programmers) are the primary users of this model.
  3. IaaS : Various administrators (sysadmin, DBA, network admins) are the primary users of this model.

SaaS applications mainly focus on non-technical users. PaaS and IaaS focus on technical users. IaaS allows the development team to focus on application development so that they can innovate and develop highly scalable application without worrying about the IT infrastructure.

Depending on how it is deployed, cloud can be broadly categorized as follows:

  1. Public Cloud: Cloud services are made available to the general public in form of application, storage or platform services, maintained by either external or internal providers for an organization. It grants access over internet for its consumers. You pay a either fixed amount every month for the equipment that are rented, or pay only for the number of hours those equipment are used in a month. For example, Amazon web services, Google app engine, etc.
  2. Private Cloud: Cloud services are made available to an organization for their private use in form of application, storage or platform, maintained and deployed by external or internal providers for an organization. General public are restricted here. Its often deployed within the firewall of the organization having access over its intranet only.
  3. Hybrid Cloud: Cloud service made available using both public and private cloud to take advantage of their individual benefits. For example, an application platform for developing web services which stores data on private cloud within their firewall, but uses public cloud to make the front end application available for general public use.

Hackers Arrested in Joint Operation With FBI


Two members of Anonymous Cambodia, an arm of the global hacking group, were arrested this month on charges of infiltrating government websites and stealing sensitive data, following an eight-month operation by local authorities and the U.S. Federal Bureau of Investigation (FBI), according to a statement posted Tuesday on the National Police website.

Bun Khing Mongkul Panha, 21, who goes by the online names Sex Machine and Black Cyber, and Chou Songheng, 21, who goes by Zoro, were arrested on April 7 for hacking a total of 30 government websites, including those of the National Election Committee (NEC), Ministry of Foreign Affairs, Ministry of Defense, Anti-Corruption Unit and Phnom Penh Municipality, as well as some private sector sites, according to the statement.

Mr. Panha confessed to hacking the sites, while Mr. Songheng said he was only Mr. Panha’s student, the statement said.

“He just wanted to learn about it. That is why he decided to join the hacker group,” the statement said of Mr. Songheng.

Both men were third-year students at the SETEC Institute, a Phnom Penh-based university offering degrees in information technology.

The two were arrested under articles 427, 428 and 429 of the Cambodian Criminal Code, which relate to information technology.

They are unauthorized access to an automated data processing system; obstructing the functioning of an automated data processing system; and the fraudulent introduction, deletion or modification of data.

The offenses each carry a fine between $500 and $1,000 along with a jail term of between one and two years.

Cambodia currently has no cyber crime law.

The attacks on government websites were Distributed Denial of Service (DDoS) attacks, in which the sites were taken offline and data was stolen from them.

The release offers few details about the investigation, but says the National Police are continuing to work with the FBI “to get more hackers.”

Dim Chaoseng, the lawyer for Mr. Panha and Mr. Songheng, said Tuesday that the Phnom Penh Municipal Court has questioned his clients and sent them to Prey Sar prison.

“The suspects are still under investigation by the court, so they have detained them for trial,” he said.

The arrests came a few days before a draft copy of Cambodia’s cybercrime law was made available online. The law has harsher penalties than the Cambodian Criminal Code for similar crimes relating to information technology.

“These are not considered major crimes,” Mark Rasch, the former head of the U.S. Department of Justice Computer Crime Unit, said about Mr. Panha and Mr. Songheng. “Since [Cambodia] doesn’t have a cybercrime law, they can’t charge them with more serious crimes.”

Mr. Rasch, who now is chief privacy and data security officer for the U.S. government contractor Science Applications International Corp., said that although it is possible that Cambodia’s government asked the FBI for help in tracking down the hackers, a more likely scenario is that the FBI discovered information about Anonymous Cambodia in their transnational investigation of the group, and handed that information off to Cambodian authorities.

Lieutenant General Chhay Sinarith, director of the Ministry of Interior’s internal security department, said authorities arrested Mr. Panha and Mr. Songheng as part of an ongoing joint investigation by the National Police and the FBI.

“The National Police were cooperating with the FBI to conduct an investigation on [hacking] when we found out these two suspects hacked the NEC…and other government institutions,” he said.

U.S. Embassy spokesman Sean McIntosh declined to comment when asked about the FBI’s assistance with the case. “We do not comment on ongoing investigations,” he said.

In July 2013, three members of Anonymous Cambodia took credit for sabotaging two NEC websites. In the attack on the NEC’s voter list website, the hackers posted a photo of Guy Fawkes masks, the final scene of Charlie Chaplin’s 1940 anti-fascist film “The Great Dictator” and a letter to Cambodians written by King Norodom Sihamoni.

In the months that followed, the group claimed responsibility for dozens more hacks, mostly of government websites, including the Council of Ministers’ Press and Quick Reaction Unit, the Council of Legal and Judicial Reform and state-run television station TVK.

In September 2013, the global group Anonymous posted a video online under the title “Operation Freedom,” saying it had “declared war” on the ruling CPP in response to clashes with political protesters that left one person dead.

In a face-to-face interview last year with a man who identified himself as Black Cyber, he said hacking Cambodian government websites was easy.

“We’ve hacked the NEC websites, the Ministry of Foreign Affairs…and now I hacked into the Anti-Corruption Unit [ACU] and I am watching them,” he said. “Their password was as simple as 1, 2, 3, 4, 5.”

sinary, wilwohl

How the passports lost?

(CNN) — How difficult is it to board a plane with a stolen passport?

Not as hard as you might think.

In any major international airport, it’s not uncommon to have your passport checked four times or more between check-in and boarding the aircraft. But if passenger documents aren’t checked against Interpol’s database of Stolen and Lost Travel Documents, travelers using those documents can slip through layers of security.

Reports that two passengers on missing Malaysia Airlines Flight 370 were traveling on stolen Austrian and Italian passports have highlighted security concerns that have troubled Interpol for years, the international law enforcement agency said Sunday. The flight, carrying over 200 passengers, disappeared from radar on Saturday and hasn’t been seen or heard from since.

MIssing flight 370: Who is ‘Mr. Ali’?

Lessons from past air disasters

Official: No plane wreckage found

"Interpol is asking why only a handful of countries worldwide are taking care to make sure that persons possessing stolen passports are not boarding international flights," said Interpol Secretary General Ronald K. Noble, in a statement.

What happened to Flight 370?

Before the departure of Flight 370, no country had checked the stolen passports against Interpol’s list since they were added to the lost-documents database in 2012 and 2013, Interpol said.

It is countries, not airlines, that have access to Interpol’s data, and many governments don’t routinely check passports against the database.

In 2013, passengers were able to board planes more than a billion times without having their travel documents checked against Interpol’s data, the agency said. Airlines carried more than 3.1 billion passengers globally in 2013, according to estimates from the International Air Transport Association.

Are stolen passports related to plane’s disappearance?

Investigators don’t yet know if the travelers with stolen passports had anything to do with the plane’s disappearance. On any given day, many people travel using stolen or fake passports for reasons that have nothing to with terrorism, aviation security expert Richard Bloom told CNN.

They might be trying to immigrate illegally to another country, or they might be smuggling stolen goods, people, drugs or weapons or trying to import otherwise legal goods without paying taxes, said Bloom, director of terrorism, intelligence and security studies at Embry-Riddle Aeronautical University.

"For all of those reasons, the very notion that passports might be important in this particular situation may be a red herring," Bloom said.

A pilot’s take: Why so few clues about missing Malaysia flight?

While it’s too soon to speculate about any connection between these stolen passports and the missing plane, Interpol’s Noble said the main concern remains that any passenger was able to board an international flight using a stolen passport listed in Interpol’s databases.

"This is a situation we had hoped never to see," he said. "For years Interpol has asked why should countries wait for a tragedy to put prudent security measures in place at borders and boarding gates?"

Few countries look up stolen passports

Interpol does not charge countries for access to its databases, but some of the 190 Interpol member countries may not have the technical capacity or resources to access the network, according to Tom Fuentes, a former FBI assistant director.

"It’s just up to the will of the country to set it up and do it," Fuentes said.

Interpol’s lost-document database was created in 2002, following the September 11, 2001, attacks, to help countries secure their borders. Since then, it has expanded from a few thousand passports and searches to more than 40 million entries and more than 800 million searches per year.

About 60,000 of those 800 million searches yield hits against stolen or lost documents, according to Interpol.

The United States searches the database more than 250 million times annually, the United Kingdom more than 120 million times annually and the United Arab Emirates more than 50 million times annually, Interpol said. (Some 300,000 passports are lost or stolen each year in the United States, alone, according to the U.S. Department of State, which collects reports of stolen passports and sends the information to the U.S. Customs and Border Protection and Interpol.)

According to the Department of Homeland Security, Customs and Border Protection vets all travelers booked on flights to, from and heading through the United States, through the Advanced Passenger Information System.

It conducts a thorough review of all relevant domestic and international criminal databases, including Interpol’s, for any issues of concern. This includes reports of stolen documents.

"If Malaysia Airlines and all airlines worldwide were able to check the passport details of prospective passengers against Interpol’s database, then we would not have to speculate whether stolen passports were used by terrorists to board MH 370," said Interpol’s Noble.

VIDEO: Do stolen passports indicate terrorism?

The Thailand connection

The Austrian and Italian passports were stolen in Thailand in 2012 and 2013, respectively, according to Interpol.

Thailand is a booming market for stolen passports. Paul Quaglia, who has been working in the region as a security and risk analyst for 14 years, said the situation in Thailand is better than it was five to 10 years ago, "but still not up to international standards."

"Unfortunately, Thailand remains a robust venue for the sale of high-quality false passports (which includes altered stolen passports) and other supporting documentation," he said.

Not all "lost" passports are necessarily "stolen" passports, Quaglia said. "Some passports ‘lost’ are actually sold by the passport holder. Some young men and others traveling to Thailand, short on cash after extended partying and high living, can be approached to sell a passport, which can be easily replaced at embassies upon presentation of a routine ‘lost passport’ police report," he said.

Searching for true identities

An investigation has been launched into the Flight 370 matter with Malaysian and aviation authorities reviewing video and other documentation to try to identify not only who the passengers were that used the stolen passports, but how the illegal passports cleared security.

Interpol has said it is currently in contact with its National Central Bureaus in the involved countries to determine the true identities of the passengers who used these stolen passports to board the missing Malaysia Airlines flight.

In an interview with CNN on Monday, Thailand Prime Minister Yingluck Shinawatra said the country is cooperating with Interpol in the investigation.

"We don’t know about their nationality yet but we gave orders for the police to investigate the passport users because this is very important to Thailand," she said.

Interpol’s Noble urged countries and airlines to adopt routine checks against its lost and stolen document database.

"I sincerely hope that governments and airlines worldwide will learn from the tragedy of missing flight MH 370 and begin to screen all passengers’ passports prior to allowing them to board flights," Noble said.

"Doing so will indeed take us a step closer to ensuring safer travel."

Yahoo to stop user access of services with Facebook, Google IDs

The Yahoo logo is shown at the company's headquarters in Sunnyvale, California April 16, 2013. REUTERS/Robert Galbraith

The Yahoo logo is shown at the company’s headquarters in Sunnyvale, California April 16, 2013.


(Reuters) – Yahoo Inc will stop letting consumers access its various online services, including Fantasy Sports and photo-sharing site Flickr, by signing-in with their Facebook Inc orGoogle Inc credentials.

The change, which will be rolled out gradually according to a Yahoo spokeswoman, will require users to register for a Yahoo ID in order to use any of the Internet portal’s services.

The move marks the latest change to Yahoo by Chief Executive Marissa Mayer, who is striving to spark fresh interest in the company’s Web products and to revive its stagnant revenue.

"Yahoo is continually working on improving the user experience," the company said in a statement, noting that the new process "will allow us to offer the best personalized experience to everyone".

The first Yahoo service to require the new sign-in process is Yahoo Sports Tourney Pick’Em, a service focused on the NCAA college basketball tournament which begins later this month. News of the change to Yahoo’s Tourney Pick’Em sign-in process was first reported by the technology blog Betanews.

Since Mayer took the reins in 2012, the company has rolled out new versions of many of its key products, including Yahoo Mail and Yahoo Finance. Last year, Yahoo announced a program to recycle inactive Yahoo user IDs, letting new users claim email addresses that have not been used for more than 12 months.

In eliminating the Facebook and Google sign-in features, Mayer, a former Google executive, is effectively reversing a strategy that Yahoo adopted in 2010 and 2011 under then CEO Carol Bartz.

The change to the Tourney Pick’Em sign-in process began on Monday, the Yahoo spokeswoman said, noting that users could still access other services with Google or Facebook IDs.

The sign-in buttons for Facebook and Google will eventually be removed from all Yahoo properties, the Yahoo spokeswoman, though she declined to provide a timeframe.

(Editing by Miral Fahmy)

The best devices from the Mobile World Congress

The world witnessed a buzz in the mobile industry with the launch of various new phones at the largest exhibition of the mobile world, Mobile World Congress. The curtains finally fell over this exhibition on February 27. This event, held in Barcelona witnessed a huge crowd of thousands of tech geeks. While the geeks have had their share of fun and explored various new gadgets, here’s a list of the top 5 launches at the event:

Samsung S5

The much-awaited smartphone and perhaps the South Korean tech giant’s biggest launch in 2014 occurred at the MWC, 2014. Samsung launched its much awaited Galaxy S5, which was one of the biggest attractions at the event. However, it was launched without any price tag. Now, the internet is abuzz with its expected price. It is rumored to be priced less than the Galaxy S4. The Samsung Galaxy S5 is set to hit the market on April 11, 2014.

Nokia X

This cell-com giant that was once the leader of the industry, before the wash over of android has now entered the android market as well. Nokia, has come out of the Symbian and Windows operating systems with the launch ofNokia X series at this event. It comes with a built in Android OS v4.1.2 (Jellybean), but it deviates from the typical android UI to a more Windows based UI. The Nokia X, X+ and XL have been priced for 89 euros, 99 euros and 109 euros respectively. Nokia has intentionally priced these phones towards the lower end of the spectrum keeping in mind that these phones shall target the developing markets such as that of India. Considering its price, Nokia’s X series is expected to create a dent in the sales of other brands such as Samsung, HTC and Sony.

Xperia Z2

This Japanese tech firm, Sony, turned thousands of heads with its flagship gadget for the first half of 2014, Xperia Z2. The Sony Xperia Z2 is set to compete with the Samsung Galaxy S5 and the iPhone 5s. It sports the same 20.7 megapixel camera found in its predecessors, the Z1 and the Z1s. The Xperia Z2 is waterproof, like the Z1 phones, with 5.2-inch screen.


LG’s massive 5 inch beast impressed us with its fun-yet-secure Knock Code unlock feature, which lets you use screen tapping patterns to unlock it. It’s post-shot picture focusing matches the Galaxy S5 too, and it brings OIS+ and 4K video recording to the imaging table to boot.

Blackberry Z3

BlackBerry Ltd unveiled a new, cheaper touchscreen smartphone and a “classic” model with a keyboard in the hope of stemming the losses and win back a once devoted following by security-conscious business and government users.The Z3 smart phone, which is to be priced at under $200, is being built under a partnership deal with FIH Mobile Ltd – the Hong Kong-listed unit of Taiwanese electronics giant Foxconn.

Modified Date: March 02, 2014 1:27 AM

How to enable IP Forwarding

By default any modern Linux distributions will have IP Forwarding disabled. This is normally a good idea, as most peoples will not need IP Forwarding, but if we are setting up a Linux router/gateway or maybe a VPN server (pptp or ipsec) or just a plain dial-in server then we will need to enable forwarding. This can be done in several ways that I will present bellow.

Check if IP Forwarding is enabled
We have to query the sysctl kernel value net.ipv4.ip_forward to see if forwarding is enabled or not:

Using sysctl:

sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 0

or just checking out the value in the /proc system:

cat /proc/sys/net/ipv4/ip_forward

As we can see in both the above examples this was disabled (as show by the value 0).

Enable IP Forwarding on the fly
As with any sysctl kernel parameters we can change the value of net.ipv4.ip_forward on the fly (without rebooting the system):

sysctl -w net.ipv4.ip_forward=1


echo 1 > /proc/sys/net/ipv4/ip_forward

the setting is changed instantly; the result will not be preserved after rebooting the system.

Permanent setting using /etc/sysctl.conf
If we want to make this configuration permanent the best way to do it is using the file /etc/sysctl.conf where we can add a line containing net.ipv4.ip_forward = 1

net.ipv4.ip_forward = 1

if you already have an entry net.ipv4.ip_forward with the value 0 you can change that 1.

To enable the changes made in sysctl.conf you will need to run the command:

sysctl -p /etc/sysctl.conf

On RedHat based systems this is also enabled when restarting the network service:

service network restart

Read more:

Hacker ងាកៗ​អុក​ឡុក! ចឹង​Email មួយ​ណា​​ទើប​មាន​ សុវត្ថិភាព​​ខ្ពស់​ទុក​ចិត្ត​បាន?

បើ​និយាយ​ពី​រឿង​ប្រើ​អ៊ីមែល​វិញ ​ទាំង​យើង​ទាំង​គេ ចេះ​តែ​ប្រើ​ផ្ញើ​ឯកសារ រូបភាព​លិច​កើត​ តែ​មិន​ដឹង​អី​សោះ​ពី​រឿង​សុវត្ថិភាព ឬ​រឿង​គេ​Hack ​លួច​ទិន្នន័យ​នោះ​ទេ។ មាន​អ្នក​ខ្លះ​មិន​ទាំង​ដឹង​ត្រូវ​ប្រើ​​អ៊ីមែល​អ្វី​ទៀត គឺ​ចេះ​តែ​ចុះ​ឈ្មោះ​តាម​គេ​ឯង គេ​ថា​ Yahoo គឺ Yahoo ដល់​គេ​ថា Gmail គឺ Gmail។ ចុះ​ប្រិយមិត្ត​ជា​អ្នក​ប្រើប្រាស់ មាន​ដឹង​ទេ​ថា​អ៊ីមែល​មួយ​ណា​មាន​សុវត្ថិភាព​ខ្ពស់​អាច​ការពារ​មិន​ឲ្យ​គេ​Hack ​ចូល​បាន?

សេវា​អ៊ីមែល​ដែល​គេ​និយម​ប្រើប្រាស់​ច្រើន​ជាង​គេ​ក្នុង​ពិភពលោក​មាន ៣ ធំៗ៖ Hotmail, YahooMail និង Gmail។ ចុះ​មួយ​ណា​មាន​សុវត្ថិភាព និង​ងាយ​ស្រួល​ជាង​គេ​?

អាន​អត្ថបទ៖ អ្នក​ប្រើប្រាស់ Yahoo Mail គួរ​ប្ដូរ​លេខ​សម្ងាត់​ភ្លាមៗ!

– ព័ត៌មាន​ទូទៅ

១. Hotmail: វា​ជា​សេវា​អ៊ីមែល​របស់​ក្រុមហ៊ុន Microsoft។ Hotmail មាន​អ្នក​ប្រើប្រាស់​ជាង ៣៦០ លាន​នាក់​ឯណោះ​នៅ​ទូទាំង​ពិភពលោក។

២. YahooMail: វា​ជា​សេវា​អ៊ីមែល​របស់​ក្រុមហ៊ុន Yahoo។ Yahoo មាន​អ្នក​ប្រើប្រាស់​ប្រមាណ​ជា ២៧៣ លាន​នាក់​នៅ​ទូទាំង​ពិភពលោក ។

៣. Gmail: វា​ជា​សេវា​អ៊ីមែល​របស់​ក្រុមហ៊ុន​យក្ស Google ។ Gmail មាន​អ្នក​ប្រើប្រាស់​ប្រមាណ​ជា ១៩៣,៣ លាន​នាក់​នៅ​ទូទាំង​ពិភពលោក។


ក្នុង​ចំណោម​សេវា​​អ៊ីមែល​​ធំៗ​ទាំង​៣ Hotmail ទទួល​បាន​ចំណាត់​ថ្នាក់​ផ្កាយ ៤,៥ Gmail ផ្កាយ ៤ និង YahooMail ផ្កាយ ៣ ក្នុង​ចំណោម​ផ្កាយ​សរុប​ទាំង ៥។ ផ្អែក​លើ​ទិន្នន័យ​ទូទាំង​ពិភពលោក គេ​និយម​ប្រើប្រាស់ Hotmail ជាង​គេ ខណៈ​ដែល​នៅ​កម្ពុជា​យើង​វិញ និយម​ប្រើប្រាស់ Gmail ច្រើន​ឡើងៗ។

បច្ចុប្បន្ន សេវា​​អ៊ីមែល​​ទាំង​៣ នេះ​មាន​សុវត្ថិភាព​ខ្ពស់ ដោយ​មាន​លេខ​សម្ងាត់​ដល់​ទៅ ២ តង់​ឯណោះ។ នៅ​ពេល log in ចូល​ដំបូង វា​នឹង​ផ្ញើ​សារ​មក​កាន់​ទូរសព្ទ​ដៃ​របស់​អ្នក​ប្រើប្រាស់​ប្រាប់​ពី​លេខ​កូដ ដែល​លេខ​កូដ​នោះ​សម្រាប់​យក​ទៅ​បំពេញ​ក្នុង​ដំណាក់កាល log in លើក​ទី​២។ ប្រព័ន្ធ​សុវត្ថិភាព​ពីរ​តង់​នេះ គឺ​ដូច​គ្នា​បេះបិទ​នឹង​ប្រព័ន្ធ​សុវត្ថិភាព​របស់​ធនាគារ (iBanking) និង​ធានា​បាន​នូវ​សុវត្ថិភាព​ខ្ពស់។

ប៉ុន្តែ អ្នក​ប្រើប្រាស់​ភាគ​ច្រើន​គិត​ថា ការ​ផ្ញើ​សារ​មក​ទូរសព្ទ​ដៃ​ពេល log in ចូល​ម្ដងៗ ជា​ការ​រំខាន។ អីចឹង ពួកគេ​មិន​បាន​បង្កើត​លេខ​សម្ងាត់​តង់​ទី​២ នោះ​ឡើយ។

កន្លង​មក គណនី​​អ៊ីមែល​​របស់ Hotmail និង Gmail មិន​ដែល​លេច​ឮ​ត្រូវ​គេ​ហែក​លួច​ទិន្នន័យ​បាន​នោះ​ឡើយ គឺ​មាន​តែ​ YahooMail មួយ​តែ​ប៉ុណ្ណោះ​ដែល​មាន​ hackers ធ្លាប់​លួច​ហែក​បាន។

ចុះ​ប្រិយមិត្ត​វិញ ចូលចិត្ត​ប្រើ​អ៊ីម៉ែល​មួយ​ណា​ជាង​គេ?

ដោយ៖ សុផាត
ប្រភព៖ foxbusiness translated by Sabay