|Data Throughput:||Up to 3.1mbps||Practically speaking, 3 to 5 mbps but potential estimated at a range of 100 to 300 mbps.|
|Peak Upload Rate:||50 Mbit/s||500 Mbit/s|
|Peak Download Rate:||100 Mbit/s||1 Gbit/s|
|Switching Technique:||packet switching||packet switching, message switching|
|NetworkArchitecture:||Wide Area Cell Based||Integration of wireless LAN and Wide area.|
|Services And Applications:||CDMA 2000, UMTS, EDGE etc||Wimax2 and LTE-Advance|
|Forward error correction (FEC):||3G uses Turbo codes for error correction.||Concatenated codes are used for error corrections in 4G.|
|Frequency Band:||1.8 – 2.5GHz||2 – 8GHz|
- NOORAZLAN BIN ROSDI bertugas di Jemaah Nazir dan Jaminan Kualiti, Kementerian Pelajaran Malaysia. Berpengalaman sebagai Pentadbiran Sistem Operasi (Network OS) dan berkaitan dengan Keselamatan Rangkaian (Network Security). Banyak memberikan khidmat nasihat kepada pihak swasta dan kerajaan berkaitan rangkaian dan keselamatan serta berkaitan Pentadbiran Komputer Pelayan (Server Administrator). Merupakan pengguna tegar *nix seperti Solaris, Linux dan BSD.
- Craig on Perbezaan antara 3G dan 4G
- Charlie on JENAYAH SIBER: PENGENALAN DAN LANGKAH – LANGKAH MENGATASI
- Nelydia on JENAYAH SIBER: PENGENALAN DAN LANGKAH – LANGKAH MENGATASI
- URL on Salam Perkenalan dan Berjumpa Kembali
- bikipu3 on Port UDP/TCP di Linux/Unix
- bikipu3 on Perbezaan antara 3G dan 4G
- bikipu3 on Perbezaan antara 3G dan 4G
- bikipu3 on Apakah Network Penetration Testing?
- bikipu3 on Apakah Network Penetration Testing?
- bikipu3 on Imbasan Sejarah E-Learning.
Sharing My ICT Knowledges
- Bitdefender Small Office Security Offers Best Protection, Greatest Convenience February 27, 2014 BitDefender RSS (firstname.lastname@example.org)
- Bitdefender Mobile Security Fortified with Elite Anti-Theft and Privacy Protection February 25, 2014 BitDefender RSS (email@example.com)
- Bitdefender Wins AV-TEST #1 Spot in Protection and Performance February 17, 2014 BitDefender RSS (firstname.lastname@example.org)
- Bitdefender Extends Antimalware Support for XP Users January 21, 2014 BitDefender RSS (email@example.com)
- Bitdefender Technology Bolsters Panorama9 Defenses January 9, 2014 BitDefender RSS (firstname.lastname@example.org)
- avast! Antivirus 2014 – Easter Egg April 18, 2014 hasik
- WordPress plugin vulnerability puts mobile visitors at risk April 17, 2014 Filip Chytry
- Are software “Easter eggs” safe? April 16, 2014 Deborah Salmi
- AVAST helps user recover stolen phone; brother gets shot fighting thieves April 15, 2014 Deborah Salmi
- Windows XP users sticking to the OS despite support cutoff April 14, 2014 Stefanie Smith
- Behind the CARO conference’s curtains: Meet AVAST speakers! April 10, 2014 Julia Szymańska
- Do you hate updating your passwords whenever there’s a new hack? April 9, 2014 Deborah Salmi
- Heartbleed affects much of internet. Time to change your passwords again. April 9, 2014 Deborah Salmi
-  April Fools’ Day joke in AVAST – prank for COO and CTO April 7, 2014 hasik
- New AVAST survey shows people not so smart with smartphone security. April 7, 2014 Caroline James
- IBM Provides SoftLayer Ecosystem Partners with New Resources for Generating Cloud Revenue April 18, 2014
- IBM Reports 2014 First-Quarter Results April 16, 2014
- The Hartford Signs Agreement With IBM To Move IT To The Cloud April 16, 2014
- IBM Creates Big Data & Business Analytics Center of Competence in Greece April 15, 2014
- IBM technology underpins project to make British Columbia’s the “smartest coast on the planet” April 14, 2014
- Lava Dials into IBM Cloud to Ensure Uninterrupted Business Operations April 14, 2014
- Novitex Enterprise Solutions Chooses IBM to Build its Cloud April 14, 2014
- IBM Delivers Disaster Recovery, Security Services to SoftLayer Clients April 14, 2014
- Made in IBM Labs: Enabling Dynamic Prioritization of Data in the Cloud April 11, 2014
- IBM Helps Israeli Mobile Telco Adopt New Data Architecture for Growth April 10, 2014
- Exploit.CVE-2014-1761.Gen March 31, 2014 BitDefender RSS (email@example.com)
- JS:Exploit.CVE-2014-0322.A February 15, 2014 BitDefender RSS (firstname.lastname@example.org)
- JS:Exploit.CVE-2014-0322.B February 15, 2014 BitDefender RSS (email@example.com)
- Exploit.CVE-2013-5065.A November 28, 2013 BitDefender RSS (firstname.lastname@example.org)
- PDF:Exploit.CVE-2013-5065.A November 27, 2013 BitDefender RSS (email@example.com)
- Application:W32/InstallBrainInstallBrain is an updater service that runs in the background and periodically updates associates browser plug-ins and add-ons.
- Trojan:HTML/BrowlockTrojan:HTML/Browlock is ransomware that prevents users from accessing the infected machine's Desktop; it then demands payment, supposedly for either possession of illegal material or usage of illegal software.
- Trojan-Downloader:W32/MevadeTrojan-Downloader:W32/Mevade.A reportedly downloads adware onto the affected system.
- Trojan-Downloader:W32/JQACThis trojan-downloader attempts to connect to a remote server and download additional files onto the affected machine.
- Trojan.Java.Agent.ITrojan.Java.Agent.I is a trojan-dropper written in Java. On execution, the malware drops and runs an executable file.
- Trojan.Iframe.BMYTrojan.Iframe.BMY (and the similar Trojan.JS.Iframe.CVT and Trojan.Iframe.BZW detections) identify webpages that contain a suspicious hidden iframe appended to the end of their HTML code.
- Trojan-Dropper:OSX/Revir.DTrojan-Dropper:OSX/Revir.D silently drops other malicious programs onto the machine; on execution, Revir.D opens a decoy file to distract the user from the program's malicious activities.
- Backdoor:OSX/Imuler.BBackdoor:OSX/Imuler.B contacts a remote server for instructions; it may then steal files or capture a screenshot of the infected computer system, which is later forwarded to the remote server.
- Exploit:W32/CVE-2011-3402.AExploit:W32/CVE-2011-3402.A is a Generic Detection that identifies malicious files which exploit a known vulnerability various Windows operating system versions.
- Exploit:Java/Majava.BExploit:Java/Majava.B identifies malicious files that exploit vulnerabilities in the Java Runtime Environment (JRE).
- Exploit:W32/CVE-2010-0188.CSummary Exploit:W32/CVE-2010-0188.C identifies malicious PDF files downloaded by the Blackhole exploit kit that exploit a known vulnerability.
- Exploit:Java/CVE-2012-5076.BExploit:Java/CVE-2012-5076.B is a Generic Detection that identifies Java exploits.
- Exploit:Java/Majava.AExploit:Java/Majava.A is a Generic Detection that identifies Java exploits.
- Exploit:W32/CVE-2010-0188.BExploit:W32/CVE-2010-0188.B identifies malicious PDF files downloaded by the Blackhole exploit kit that exploit a known vulnerability.
- Exploit:Java/CVE-2012-4681.HExploit:Java/CVE-2012-4681.H identifies malicious Java Archive (JAR) files that exploit a known vulnerability.
- Trojan-Spy:W32/FinSpy.ATrojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity.
- FlameFlame is a sophisticated information-gathering program used in targeted cyber-attacks against organizations and nation states in the Middle East.
- Trojan:W32/PatchedWindows components that have been 'patched' by a malicious application, usually to facilitate the malware's operations. The affected component and the purpose of the patching may vary depending on the malware in question.
- Rootkit:W32/ZAccessRootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additionaly advertising information.
- Backdoor:OSX/MacKontrol.ABackdoor:OSX/MacKontrol.A connects to a remote server to receive further instructions, without the knowledge or permission from the user.
- Linux Video of the Week: Red Hat CEO Explains Why Enterprises Need Open Infrastructure April 18, 2014 Libby Clark
- Troubleshooting Ubuntu One Cloud Storage on Linux April 18, 2014 Jack Wallen
- Ubuntu 14.04 LTS Debuts With OpenStack Icehouse and Docker Support April 17, 2014 Katherine Noyes
- Linux-Based Autonomous Sub Leads Malaysia Airlines Flight Search April 17, 2014 Eric Brown
- The MarS DIY Platform for Around $100 (Without Screen) April 16, 2014 Ben Martin
- Learn How to Contribute to the Linux Kernel, Take the Eudyptula Challenge April 15, 2014 Libby Clark
- Intro to Linux Training Opens Up a World of Commands April 15, 2014 Libby Clark
- Answers to Your Q's on Free Intro to Linux Course from edX Twitter Chat April 15, 2014 Libby Clark
- How to Manage Linux Virtualization Using ConVirt Open Source Deployed on Amazon Web Services April 14, 2014 Jaydeep Marfatia
- Hacking Your Linux Keyboard with xkb April 14, 2014 Carla Schroder
- Raspberry Pi Spun Into Embedded Module April 11, 2014 Eric Brown
- Linux Foundation Responds to the Heartbleed Bug April 11, 2014 Eric Searcy
- The KVM Groundswell Continues April 10, 2014 Jim Wasko
- Pivotal Brings PaaS to the Enterprise Through Community Collaboration April 10, 2014 Libby Clark
- Citrix: Top 5 Do's and Don’ts When Moving to the Cloud April 10, 2014 Krishna Subramanian
- Upcoming Btrfs Features for Linux Containers April 9, 2014 Brandon Philips
- How to Install the LTSI-3.10 Kernel on Raspberry Pi and MinnowBoard April 9, 2014 Hashimoto
- How to Create an LTSI Kernel Package for Raspberry Pi and MinnowBoard April 9, 2014 Hashimoto
- Replace the Retiring Windows XP with Linux April 9, 2014 Carla Schroder
- IBM Promotes Free LF Course April 8, 2014 Linux Training Staff
- Analysis: IT threat evolution Q1 2014 April 17, 2014
- Blog: New threat: Trojan-SMS.AndroidOS.Stealer.a April 17, 2014
- Blog: Would you like some Zeus with your coffee? April 16, 2014
- Blog: SyScan 2014 April 13, 2014
- Analysis: Financial cyber threats in 2013. Part 2: malware April 9, 2014
- Blog: The omnipresent dad April 9, 2014
- Blog: Adobe Updates April 2014 April 8, 2014
- Blog: Microsoft Updates April 2014 - Office and Internet Explorer Critical Vulnerabilities April 8, 2014
- Blog: End of the line for Windows XP April 8, 2014
- Blog: Stealing from wallets April 4, 2014
- Blog: Garfield Garfield True, or the story behind Syrian Malware, .NET Trojans and Social Engineering April 3, 2014
- Analysis: Financial cyber threats in 2013. Part 1: phishing April 2, 2014
- Blog: Caution: Malware pre-installed! March 31, 2014
- Analysis: BitGuard: a system of forced searches March 21, 2014
- Analysis: Spam report: February 2014 March 20, 2014
- Blog: Analysis of, Malware from the MtGox leak archive March 14, 2014
- Blog: Agent.btz: a source of inspiration? March 12, 2014
- Blog: Trust. Trust. Trust March 10, 2014
- Blog: RootedCON V March 10, 2014
- Blog: Fraudsters are playing a different kind of card game March 6, 2014