

Understanding different License conditions as per Creative Commons:
Attribution
Means you can copy, distribute and display the images(or any other piece of work). Also you can create derivative of the image. You can alter and modify the image at your will.. All you need to do is provide proper credit to original owner (Like linking back to the profile of uploader or direct flickr image page).
Noncommercial
Means you can copy, display and distribute the work but only for non commercial purpose.
No Derivative Works
Means you can copy, display and distribute the work as it is. You can not modify the work in any form.
Share Alike
Means you can use the image or work and distribute or display it under the same license to this one.
Flickr and CC License:
Images on flickr are either strictly copyrighted or fall under six CC license. Images marked as copyrighted (All Rights Reserved) are not meant to be copied or used in any any form. You cannot display or use these images until and unless you have prior permission from original author. Rest, other images are uploaded under following sic license.
Attribution License
Images uploaded under this license are best to use for your blog or site. You can modify these images and use it in any form you like. All you need to do is provide a proper credit and linkback to original owner.
Click here to search Images under Attribution License
Attribution-NoDerivs License
You can use these images as long as you credit the photographer and do not modimy the image. Images under this license are also a fair good deal for your blog or site.
Click here to search Images under Attribution-NoDerivs License
Attribution-NonCommercial License
You are free to modify and use these images by providing proper credit to photographer (or uploader). These images cannot be used for any commercial purpose. So if your blog or site is monetized by any paid advertising like Google Adsense, better not to use these type of images.
Also while using these type of images, its necessary to look into future possibilities of monetizing your blog/site. Your site/blog may not be displaying any paid advertisements right now, but in future you may change your mind and start monetizing the ad spaces. So better avoid these type of images on your webpage.
Click here to search Images under Attribution-NonCommercial License
Attribution-NonCommercial-NoDerivs License
Same as above one. But you are restricted to modify the images in any form and use them as it is.
Click here to search Images under Attribution-NonCommercial-NoDerivs License
Attribution-ShareAlike License
You are free to use and modify the images until you credit the photographer release the work under same license.
Click here to search Images under Attribution-ShareAlike License
Attribution-NonCommercial-ShareAlike License
However, she recently discovered that a photo printing site had not only posted several of her works under a false name (Yahoo! Cache Version), but was selling prints of those photos in their store. A search through their Ebay store turned up approximately £2,500 (about $5,000) in sold prints, all with her work.
Seeking repayment, Guðleifsdóttir turned to a local attorney who sent the company a stern letter. The company removed the works from their site and then fell quiet. No future correspondence was returned and Guðleifsdóttir, a single mother and a college student, was left footing the bill for the lawyer.
Understandably upset at this outcome, Guðleifsdóttir vented her frustration in her Flickr account.
The story struck a chord with the Flickr community. It quickly reached the front page of Digg (earning over 4000 Diggs) and the entry generated well over 400 comments.
However, the original entry was to be short lived. Only hours after it hit the front page of Digg, Yahoo!, who owns Flickr, removed the post. According to Guðleifsdóttir, Yahoo! cited alleged terms of service violations.
That, in turn, has kicked off another storm of controversy with many criticizing Yahoo!’s move as censorship.
But in addition to being an interesting case of plagiarism gone awry, the story also serves to illustrate many of the challenges that arise when trying to protect your works on the Web.
for full article click hereA screenshot of one of the Malaysian sites attacked by a ring of Indonesian hackers.
Hotmail, Google and Yahoo! have joined a growing number of email service providers whose users have been duped by hackers into giving over their passwords in phishing attacks.
The British network said it has seen a list of some 20,000 hijacked e-mail accounts that included accounts from Gmail, Yahoo! Mail, AOL, Comcast and EarthLink. The latter two are major US Internet service providers.
The intrusions, which fool users into giving their details to a dummy website, come amid a sharp rise in the number of phishing attacks. According to the Anti-Phishing Working Group some 50,000 mass attacks took place in June 2009, almost double the number recorded in January.
Cyber criminals obtained the passwords by setting up fake websites identical to the main amail services and tricking users into giving their username and password information on the site.
It is widely feared that the stolen information will be used by to access email accounts and steal personal information.
What is Phishing?
Phishing is a criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
How can internet users avoid falling prey to Phishing scams?
a) A user should not have the same username and password for multiple accounts as once a cyber thief has access to one account, it will be easy for him to access the other accounts.
b) Avoid clicking on weird requests to click on URLs or download software links
c) Get an antivirus software installed for your PC and keep your operating system up-to-date
d) Be on the guard and look out for URLs that divert you to other websites
e) Never follow links in an email claiming to be from your bank. Ignore these types of emails.
f) Adjust you browser settings to tighten up security especially if you use web based email. (Inputs from Agencies)
source: http://in.news.yahoo.com/242/20091008/1360/ttc-phishing-attacks-no-one-is-safe.html
There aren’t too many details emerging yet, but Business Times is reporting that the deal is finalized with a sale to MOL Global, a Malaysian e-commerce company that Friendster has been working with since October to power its payments platform. MOL Global CEO Ganesh Kumar Bangah took the stage at a signing ceremony today in Kuala Lumpur to announce an expected influx of $110 million yearly revenue from the acquisition.
This deal makes sense given Friendster’s audience and the current playing field for social networking in Asia, where Friendster has more monthly uniques than any other network. We expect this combination of assets to lead Friendster deeper into a microtransaction-type revenue strategy, perhaps involving a greater focus on social gaming moving forward.
Social gaming is becoming a significant revenue play for social networks worldwide, in the U.S. with companies like Zynga, EA’s Playfish and Playdom pulling down multimillions in annual revenues from games on Facebook and MySpace , and in Latin America where hi5 is aggressively pursuing its successful social gaming strategy as well.
It’s difficult to judge just how much the deal makes sense until we see the actual financial numbers, but it could be a decent exit for Friendster after a long and challenging road.
source: Dec 9th, 2009 | by Barb Dybwad
FEB 19 — Once upon a time, before the Internet became as common as the television in Malaysian homes, public figures made local speeches that were tailored to suit the audience that was physically present.
This worked well for politicians wishing to entertain the parochial tendencies of the audience of the day without jeopardising their prospects of becoming nationally relevant.
Today, however, such speeches quickly leak into the wired world of the Internet, putting things into a different context, and revealing the speakers' supposed real values to the world.
Playing local politics with the awareness that the audience is always the whole wide world is no easy task, especially for those who have been in politics and in power long before the Internet changed everything.
The dominant Umno learned this the hard way three years ago when it decided to telecast "live" its national assembly. The parochialism and racism expressed by its candidates on that occasion for the nation to hear soon forced it to backtrack.
Defensive arrogance does grow out of the inability to evolve.
The attempt to block access to Raja Petra Kamarudin's controversial Malaysia Today website last year managed to stop traffic going to that site, but did not stop access to its contents. Mirror sites sprung up immediately to nullify the censorship.
The police decision in September 2008 to use the Internal Security Act to jail Raja Petra, along with prominent opposition politician Teresa Kok and journalist Tan Hoon Cheng, merely backfired. The de facto minister of law, Datuk Zaid Ibrahim, soon resigned in protest.
Publicly calling female bloggers liars, as then Tourism Minister Tengku Adnan Tengku Mansor did in March 2007, is also not a very smart thing to do. The negative reaction on the web on that occasion was tremendous.
Opinions expressed for local consumption becoming national news is part and parcel of a revolution in information technology which carries enormous consequences for the near future. Some are positive, and some will certainly not be.
Through the Net, you can sell old useless books you have under the stairs on the world market; you can get to know strangers on the other half of the world merely by being on chat sites; and you can arrange an entire holiday to the south of France without talking to any salesperson at all.
In Malaysian politics, we have witnessed how SMSes, videos and phone cameras have come into play. While these can uncover abuse of power, as in the case of the woman forced to do ear-squats naked while detained by the police in December 2005; reveal dubious practices, as in the case of the Lingam Tapes released in 2007 showing a prominent lawyer boasting about his ability to fix top judge appointments through political connections; and contribute to court cases, as in SMSes supposedly sent by Deputy Prime Minister Datuk Seri Najib Razak to a lawyer, discussing the detention of a close associate then charged with involvement in the murder of a Mongolian woman.
The latest political incident involving IT innovations concerns the circulation of nude pictures of prominent opposition politician Elizabeth Wong, secretly taken on a phone camera.
The case of Wong (also a blogger), who has offered to resign from her position as state assemblywoman for the opposition-held Selangor, adds worrying dimensions to the political use of modern IT.
First, it is not only the line between the local and the national that is being erased. The line between the private and the public is fading fast as well.
That is worrying indeed. Most urbanites in Malaysia of all races, especially in the Klang Valley where Wong lives, would undoubtedly consider Wong the victim. Mass media attempts to class the case as a "sex scandal" — and this happened on both sides of the Causeway — smack of shameless sensationalism, journalistic amateurism and political opportunism.
In the sanctity of her home, surely she is allowed to walk scantily dressed, sleep half-naked, even shower nude, and yes, have sex without clothes on. The culprits deserving punishment are those who facilitated the publicising of those pictures, regardless of whether they were taken with her permission or not.
The fact that she is an unmarried woman, and not a man, has had a serious impact on how the incident is being interpreted. Should a male politician, married or not, such as former Selangor Menteri Besar Datuk Seri Dr Khir Toyo, for example, have been photographed in the nude while asleep, the fallout would have been minimal, even comical.
The Wong case also shows the disturbing shrinkage of moral space when the private and the local are technologically subsumed under the public and the national.
Moral values do differ geographically, individually, culturally and according to lifestyle. This diversity is denied when such a case gets politicised, and here, the supposed sensitivities of the vocally most religious, most parochial, most traditional and most rural are allowed to define the national public norm. Wong is being sacrificed to appease illiberal elements within the opposition. Surely, this is not what the Pakatan Rakyat is fighting for.
A political cyber war has started in Malaysia. While we thought that the old would be at the mercy of the new in such a showdown, it is time to realise that, in truth, the more desperate and more immoral has the edge.
sources: Ooi Kee Beng, Institute of Southeast Asian Studie. (themalaysianinsider.com)
The potential for online warfare has become a hot topic after a string of major incidents in recent years.
American officials have been holding secret talks with Russia and the United Nations in an attempt to strengthen internet security and rein in the growing threat of cyberwarfare.
The effort, first reported in the New York Times, is a virtual version of the nuclear arms talks being held between the two nations in Geneva – but rather than focusing on bombs and missiles, the discussions are aimed at curbing the increasing level of attacks taking place online.
With a rising tide of strikes by hackers on major institutions – including banks, businesses, government agencies and the military – diplomats are attempting to forge an international consensus on how to deal with cybersecurity problems.
"Both sides are making positive noises," James Lewis, a senior fellow at the centre for strategic and international studies and a cyber security expert, told the Guardian. "We've never seen that before."
The potential for online warfare has become a hot topic in recent years, after a string of major incidents. Large-scale cyberattacks took place during last year's conflict between Russia and Georgia while the Estonian government came grinding to a halt after an internet assault in 2007.
Critics have said the scale and impact of such incidents may be overstated, but experts accept there are serious dangers from criminal gangs operating online – as well as the rapid growth of state-sponsored espionage conducted over the internet.
Earlier this year, some of the plans for a new £2bn fighter aircraft being developed by the US, UK, Netherlands and Israel were stolen when hackers broke into American computers. Two years ago, it was revealed that hackers thought to be linked to the Chinese People's Liberation Army had breached computer security systems at the Pentagon and Whitehall.
The latest discussions are thought to be an attempt to broker some sort of cross-border agreement over a number of issues related to internet security. Russia is said to be seeking a disarmament treaty for cyberspace, while the US hopes to use the talks to foster greater international cooperation on cybercrime.
Lewis confirmed that a Russian delegation met with officials from the US military, state department and security agencies in Washington about five weeks ago. Two weeks later, the White House agreed to meet representatives from the UN committee on disarmament and international security, the New York Times reported.
There are numerous sticking points however, not least the fact both the US and Russia – as well as most advanced militaries around the world – have sophisticated cyber warfare capabilities they are reluctant to document. Although the dangers of virtual conflicts are recognised, neither country is keen to hinder any future deployment by revealing the technologies they have developed, Lewis said.
Despite that, the talks mark a distinct turnaround from the approach of the Bush administration, which had resisted engaging with Russia and the UN over the prospect of a treaty on cyber weapons. Instead, it focused on dealing with cyber threats by economic and commercial means, rather than through the military.
Earlier this year, however, President Barack Obama identified cyber attacks as a "national security priority" and pledged to appoint a top-level White House adviser to co-ordinate responses..
"Cyberspace is real, and so is the risk that comes with it," he said in May. "From now on, our digital infrastructure will be treated as a strategic asset."
However, the post remains unfilled six months after the announcement., with disagreement inside the administration over how to coordinate the appropriate level of response. While some presidential advisers want the White House to take oversight of the issue, other top Obama aides prefer to let the commercial market handle cybersecurity. The US military and intelligence officials, meanwhile, prefer to pursue their own security programmes without direction from the White House.
Many American experts are more concerned with the financial threat of cybercrime and internet-based fraud, particularly since international enforcement efforts have been weakened by an inability to track and arrest the hackers responsible, many of whom are based in Russia and China.
Online crime is now a multibillion pound business worldwide, with criminal gangs across the globe conducting sophisticated cyber attacks to steal money from banks and disrupt commercial websites.
Last year, hackers broke into the Royal Bank of Scotland, using information gathered from to create cloned bank cards that were then used to withdraw more than £5m from cash machines in dozens of cities.
This August, an American man, Albert Gonzalez, pled guilty to his role in an attack that netted millions when an international hacking ring – largely based in Russia and the Ukraine - stole 130 million credit and debit card numbers from some of America's biggest retailers.
Despite knowing the identities of several individuals linked to Gonzalez, however, the lack of international cooperation means that the other culprits remain beyond the reach of US prosecutors.
source: Daniel Nasaw, Bobbie Johnson. (guardian.co.uk)
JOHOR BARU: More than 4,000 cyber complaints, mostly concerning cyber crimes have been lodged with Cybersecurity Malaysia in the past two years.
Its chief executive officer Lieutenant-Colonel Husin Jazri said that the complaints, mostly consisted of hack threats, fraud, denial of services and other computer problems such files lost or corrupted by viruses.
“We have received about 2,000 complaints in 2007.
“Last year, a total of 2,123 cases were lodged with us,” he told pressmen after the presentation of five computers to a school in the Kampung Simpang Arang Orang Asli settlement.
Science, Technology and Innovation secretary-general Datuk Abdul Hanan Alang Endut presented the computers on Saturday.
Lt-Col Husin explained that the agency’s services catered for individuals, as well as companies, who faced computer related problems.
“Our consultation services are free but we will charge any work that needs to be done such as repairs.
“The charges varies on a case by case basis,” he said adding that the agency rarely charged students or those from the lower-income group.
He said that the agency’s 150-strong staff was dedicated to solving computer problems as they aimed to serve the needs of the public.
“We have an emergency response team that caters to the complaints.
“Among our other services are digital forensics, security assurance, security management and best practices,” he said.
He added that the agency’s main objective is to be a one-stop coordination centre for all national cyber security initiatives.
“Among the initiatives are reducing vulnerability of ICT systems and networks and nurture a culture of cyber security among users and critical sectors,” he said.
Lt-Col Husin said the public could contact the agency at 03-89926888, fax at 03-89453205 or email at info [at]cybersecurity.my.
“People can also contact our hotline at CYBER999 to report any problems.
“Our office in Seri Kembangan is open from Monday to Friday,” he said.
He said that the agency was also working closely with enforcement agencies such as the police in solving and curving cybercrimes in the country.