Total Pageviews

Monday, January 18, 2010

MNCC Membership Fees

Members who are in arrears of subscription including 2010 fees are advised to make their payments as soon as possible.


A visit to Penang Water Corporation , PBAPP (IT Centre and the Air Itam Dam Theme Park) has been planned. The suggested date is 4 February 2010 but is subject to confirmation from the organization. Briefing on new developments including the Joint Collection/Billing Systems and Water Management Systems have been requested.

Other possible educational visits proposed include the following but are subject to confirmations from the respective companies:
Suggested Date
Motorola Technology Sdn Bhd 4 March 2010
Dell Asia Pacific Sdn Bhd 25 March 2010
Telekom Malaysia 22 April 2010

As you may well know it is also important for PERC to organise some talks and seminars. For this purpose, we would appreciate if we can receive suggestions for speakers (vendors included) and subjects of current interest. We also invite ideas and suggestions from members for other events/activities for 2010. If you have any suggestions for activities or visits that we can arrange, please contact us at or PERC will continue to organise events relating to ICT development on a regular basis provided it receives sufficient support from its members.

Hands-on Workshop

Hands-on Workshop on
Auditing With Network Security Vulnerabilities

The above workshop was successfully held on 12th November 2009 at the Traders Hotel, Jalan Magazine, Penang. A total of 32 participants attended the workshop as follows:

Government Departments 19
Government Agencies 6
Institutes/Universities 6
MNIs 1

The Malaysian National Computer Confederation (MNCC) together with Penang Regional Centre (PERC-MNCC) organised this hands-on workshop entitled, “Wireless Threats and Security Assessment”. The workshop was conducted by Mr Mohamad Nizam Kassim, a security assurance analyst from CyberSecurity Malaysia for Wireless LAN and UMTS Mobile Network Technologies. The workshop involved 5 modules: Wireless Discovery, Sniffing & Mapping; Wireless Protocol Attacks Wireless; Denial of Service Attacks Wireless; Client exposures & Vulnerabilities and Wireless Traffic Assessment.

The above are some photos of the workshop