Thursday, July 27, 2006

Rain

Here comes again
Those raindrops
From the outside
Of my window
It is this same rainy
Morning that she
Gave me that
Quick last kiss
Her conclusion
To our bind
That never ties

When will I ever
See her again like
Those raindrops
From the outside
Splashing freely from
My open window?

Tuesday, July 25, 2006

Quickie

Naglalaro ang
Mga kamay sa
Madilim na kawalan
Na walang
Matang makakatanglaw
Tanging makintab na sahig
Mga paa ng mga silya
At mga nangagsisipaggapang
Na mga langgam
Na abalang
Nag-iimpok ng
Malansang likidong
Biyaya mula sa taas
Sa isang lamesang
Naabot ay langit
It rained.

I harvested
My wet clothes
Inside my room.


How cruel
The world is
Keeping me away
From the rays
Of the sun
The same way
It keeps her
Away from me.

It's raining harder
In my mind.

Saturday, July 22, 2006

I don't want to eat
or don't eat at all
but wait I'll starve
I'll starve to death
the death like my grandpa
which i never noticed
in that very same night of August
wen I'm wide awake in my room
in my dreams of trophies and medals
A sad past of him that
I couldn't clearly recall
Just his strong and hard stick
which always hit me
everyday when he sees me
until i became what i am today
without his strong and hard stick
But still in my mind
A torture.

Monday, July 10, 2006

Remembering the Trojan Horse



Troy remained unconquered for years.

The city that exhibits undoubtedly strong information security chain with its surrounding concrete walls, numerous booby traps on the grounds, thousands of armored warriors, and tight security at the entrance, is quite impressive. But not until the Trojans came along to the scene with their Trojan Horse. The humble statue that made even the most secured information security chain down.

Information Security

No one could tell all the possibilities of an intrusion to a certain information security system. Nor can anyone predict and eradicate all risks from unauthorized use of a company’s confidential information no matter how it is well established, highly equipped with advanced technology, or even being a top organization in the world.

Indeed. The possibilities of intrusion are endless. It keeps on coming to destroy. It is because Information Security System is not necessarily watertight, foolproof nor perfectable. It is an imperfect form but effective part of risk management. It is in the system that we try to avoid loss of confidentiality to a company/client’s documents that may be used to attack and destroy a company’s reputation to result financial loss, degradation, and closure.

The Entrance to Troy

We are always in the notion that computer systems either it is password protected or anti-hacking enabled make us safe from intrusion. That is not totally enough. It is important to note that Information Security is everyone’s responsibility. This includes from the top-line to the down-line list of employees no matter how low or how high your salaries are. The involvement requires us to facilitate and cooperate with the rules being implemented and report any means of actions that we saw or about to see in the future.

To have a secured entrance to Troy, employers must also exhibit the ‘trust’ aspect of information to its employees. The company’s level of trust to its employees to have integrity and stewardship in all the things that he is doing is dependent on the way they will educate them for such issue. They must be familiar with the rules and the jurisprudence in general. Moreover, employees must be know what are the things expected for them like not to share passwords, pass confidential information from unauthorized person, etc and know all possible disciplinary actions.

The Weakest Link: The Trojan’s Target

It is always such a laugh for a company leaving all its information security measures to its password protections, advanced computer systems, and other computer protection softwares. Yes. These tools are more or less effective but disregarding its employees and clients as the ones who are also responsible for protecting those confidential information, the company will only provide a false sense of security. This is a misconception that most companies do by taking Information Security not as a system but as a technology.

Let me take you back to the City of Troy.

The city (a company) has over thousands of warriors (employees). It has a well-protected territory. It has surrounding walls, and other security tools that they believe would prevent unauthorized intrusion. It also emphasizes more on putting more anti-intrusion traps and tools surrounding the city (has tight and secured information security technology not system).

A clever lad (a hacker) studies the situation and asked: how could I get in this land?

The clever lad knew that going to the walls and any forced intrusion by himself through its entrance would take him time which was not willingly to spare. The clever lad used some of his friends living in the city (lack of integrity of employees). He then realized that the people of Troy were the weakest link.

He led his men to make a giant hollow wooden horse and filled it with his warriors. Near the territory of Troy, they left the horse. A spy convinced the Trojans that the horse was a gift despite the warnings of other people. The people of Troy accepted the horse being a sacred animal of Poseidon in the myths.

It was a celebration for the Trojans that the warriors hidden from the horse emerged when the city was in a drunken stupor. Once inside, they opened the city gates to allow the rest of the army to enter, and the city was pillaged ruthlessly —all the men were killed, and all the women and children were taken into slavery.

Why was the attack successful?

If we do always depend on our computer systems we could possibly miss the fact that information security system goes beyond the use of any type of computer technology or in the case of Troy, in their tools. We must be aware that people is always the weakest and strongest asset depending on how they are educated or how they could participate in our information security system.

Firewalls and other computer tools are effective but it is not a good idea to include it in the system as a priority for its formulation. It only exhibits a security for the computers but not the totality of security for the real organization. Therefore it is of great importance to elevate more from software and hardwares to employee education schemes in any Information Security Policy.

This should be the actual system for any organization to be prevented from any possible intrusions that would result to company’s closure and distruction like the City of Troy. And we don’t want that to happen to us in the future.

Wednesday, July 05, 2006

I am getting addicted to the internet lately. And I am ignoring how much I am spending everyday while I am sitting on the humble internet cafe near my boarding house. Once I sit on the commercial public PC, I conquer my time. I don't even care for time actually. I don't even also care about those people around me logging in and out from their respective chairs while I am still busy researching for any relevant information to be added in my brain cells and chatting to my closest friends.

Indeed it is now becoming my world.

You know after my 1030pm to 630am shift I usually wait for the shop to open and when it does my cyber world commence. My nerves feel it too as if wanting some nourishment from the electronic mails, chats from msn messenger, and updates from my closest friends. And I get excited when I received those. I read their mails and messages a couple of times and print it along with all my other hard copy files in my room for future reading. This is to boost my emotional health to a higher level especially when I am alone.

And I am afraid to be alone.

Re-reading those materials makes me feel otherwise; lifting me and make me feel that in some place not so far away there are still some people who are still interested in conversing with the empoverish and humble person such as me. Those materials protected me from doing harsh acts; maybe commiting suicide or perhaps killing myself of inhaling too much cigarette smoking. They are my protectors and one of my topmost security for personal development and to mark a happy face somehow. That's why it is my great purpose to add more of those documents in my drawer. Lots of those that would update how many good thoughts I had when interacting with those guys and gals that I call friends.

The thing I didn't have here in Manila.

Monday, July 03, 2006

Abortion

5 am
Before school
I should sharpen up
My pencil touching it
With a soft grip
Gently squeezing
It at a constant friction
Until it reached a point
That is enough
To bring sweat
More than the sweat
Of my usual
Jolens and text games
Or sipa and patintero
It is a quick relief
To burst out
A drop of joy
To trim down
That poisonous lead
Memory Teacher John
Planted in
My mind.

Bi Thumb rating