Thursday, July 28, 2011

Camera360 Ultimate v 2.4.1 apk

Aplikasi ini ga kalah serunya dibandingkan dengan camera fun, buatlah dirimu menjadi seorang yang ahli dalam mengambil gambar, tanpa perlu pengalaman di bidang photoghrapy. Hanya dengan sebuah aplikasi kecil saja teman-teman sudah tampak seorang yang profesional, hahaha. Aplikasi yang top deh pokoknya, nyesel deh klo ga dicoba

syarat :

- resolusi 480 atau lebih


langsung aja download

Continue Reading...

Camera Fun Pro Version 3.2 apk

Foto efek yang keren untuk kamera hp berbasiskan android.
Efek langsung dapat dilihat sebelum gambar diambil. Keren dah pokoknya.

Nyesel kalo tidak dicoba

syarat :
sistem operasi android 1.6 ke atas

Langsung ja download
Continue Reading...

Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin

Company claims fighter project schematics and hosted government information were not leaked


Over a week has passed and Lockheed Martin Corp. (LMT), the U.S. government's top information technology services provider, was hacked. The attack has been characterized as a "fairly subtle", yet "significant and tenacious" attack on servers at its massive Gaithersburg, Maryland data center, located not far from the company headquarters in Bethesda.

As details emerge the attack is appearing more and more like it was lifted out of a spy movie or Tom Clancy novel. The hackers appeared to have gained entry using information stolen in a separate, even more audacious attack of one of the world's highest profile security firms.

I. RSA Sec. Breach -- Prelude to the Lockheed Martin Attack?

Back in March hackers gained access to RSA Security's servers. RSA Sec. takes its name from the last initials of founders Ron Rivest, Adi Shamir, and Leonard Adleman, three top cryptographers. The trio's popular public-key cryptography algorithm shares the same name -- RSA.

At the time of the RSA Sec. intrusion, the company commented that despite the fact that it believed information was stolen, the company did not believe customer information or the security of the company's software products were not comprised. Yet, they did advise clients to follow online advice to safeguard themselves against possible fallout from the data loss.

The attack on RSA was described as "extremely sophisticated".

Sources close to Lockheed point to compromised RSA SecurID tokens -- USB keychain dongles that generate strings of numbers for cryptography purposes -- as playing a pivotal role in the Lockheed Martin hack.

II. Damage Control

Hackers are believed to have entered Lockheed Martin's servers by gaining illegitimate access to the company's virtual private network (VPN). The VPN allowed employees to connect over virtually any public network to the company's primary servers, using information streams secured by cryptography.

With the RSA tokens hacked, though, those supposedly secure VPN connections were compromised.

Lockheed says that it detected the attack "almost immediately" and warded it off quickly. The company has since brought the VPN back online, but not before "upgrades" to the RSA tokens and adding new layers of security to the remote login procedure.

III. What Was Lost?

At this point the question on everyone's mind likely is "What was lost?"

Lockheed has cause for concern -- the company is not only safeguarding a wealth of U.S. government military information from external sources, it's also protecting its own valuable projects -- the F-16, F-22 and F-35 fighter aircraft; the Aegis naval combat system; and the THAAD missile defense.

A U.S. Defense Department spokeswoman, Air Force Lieutenant Colonel April Cunningham told Reuters Saturday night that the risk from the breach was "minimal and we [the USAF] don't expect any adverse effect."

Lockheed Martin claims that no compromise of customer, program or employees' personal data occurred. The company has made similar claims about past breaches.

Now that the Pentagon is involved, if anything was stolen, it should be identified shortly.

IV. Who Attacked Lockheed Martin?

After the pressing issue of what was lost, perhaps the second most compelling question is who was behind the breach. Military officials and security staff at Lockheed are looking for clues in local time stamped information stored on the server and IP logs, trying to find out who accessed the compromised systems from where and when.

The problem is not easy as hackers commonly reroute their malicious traffic through multiple proxies, disguising their location. That said, given the nature of attack -- take down one of the world's top security firms and then use that information to compromise a top defense contractor -- involvement by a foreign government is suspected.

Lockheed posted a job listing last week requesting the services of a "lead computer forensic examiner". Requirements included someone who could "attack signatures, tactics, techniques and procedures associated with advanced threats" and "reverse engineer attacker encoding protocols." The cyber forensics expert's first task will likely be to try to pinpoint the identity of the attacker.

The most likely suspect is obviously China, with whom the U.S. government has been waging a "cyberwar" with for a decade now. China hires freelance hackers and maintains a large military force of official hackers as well. It uses this force to infiltrate international utilities, businesses, government servers, and defense contractors, looking for valuable information.

China has recently been testing a stealth jet, the J-20, which contains features curiously similar to those found on past Lockheed Martin designs. China insists, though, that it did not use stolen information to build its new weapon.

V. One Million Threats

Lockheed Martin's IT staff say they encounter 1 million "incidents" a day. They have to filter through these, distinguishing "white noise" from serious threats.

The Maryland data center from which information was taken is a state of the art facility, built in 2008. It covers 25,000 square-feet and cost $17M USD to build. But even with relatively modern systems and protections, defenses were still not strong enough to hold off the sophisticated and savvy attacker.

The company has a separate back-up data center in Denver, Colorado, which shares some of the company's contract workload. That center is not believed to have been breached in the intrusion.

Going ahead, Lockheed Martin will invariably face pressure from the U.S. Military and Congress to do a better job in making its systems breach-proof. But given the company's budget versus China's virtually blank check given to cyber security efforts, one has to wonder how much the company will be able to do with so little.

Sondra Barbour, the company's chief information officer, reminded employees in an email, "The fact is, in this new reality, we are a frequent target of adversaries around the world."

dikutip dari dailytech.com
semoga bermanfaat
Continue Reading...

Chinese Hackers Score Heist of 35 Million South Koreans' Personal Info

Chinese authorities have not yet agreed to cooperate


There's an elephant in the room, when it comes to internet attacks, and that elephant is China. While America once was fearful of China's communist philosophies, today the Asian giant poses a far greater threat in its economic success.

China is home to some of the world's most sophisticated hackers, many of which are given a virtual green light to attack foreign governments and businesses, in attacks that assist China's government and Chinese businesses. It's a well known fact, but everyone is too afraid to try to stand up to the Asian nation, as it hold large amounts of debt, as well as enjoys control of much of the world's rare mineral resources and manufacturing.

South Korea has become the latest to reportedly bear the brunt of Chinese cyber aggression. The Korea Communications Commission (South Korea's equivalent of the U.S. Federal Communications Commission) says that hackers this morning attacked Nate portal and Cyworld blogging sites, both operated by SK Communications Comp., Ltd. (KDQ:066270).

The hackers reportedly made off with personal information from an astounding 35 million users. The stolen information includes -- in some cases -- phone numbers, e-mail addresses, names, and coded data of users. The attacks are believed to have originated from China.

South Korea, like the U.S., is struggling to protect its businesses from foreign attacks. In April, Nonghyup, a large South Korean commercial bank, suffered an attack which was believed to have been sourced from North Korea. Then in May, South Korea's Hyundai Capital, which is owned by Hyundai Motor Company (SEO:005380) and General Electric Comp. (GE) subsidiary, GE Capital International, suffered a similar breach.

Meanwhile in mid-May in the U.S. top defense contractor Lockheed Martin Corp. (LMT) was the victim of a sophisticated cyberintrusion, which was believed to have originated in China.

The U.S. government now says that cyberattacks can be construed as an act of war, if they cause real world death or destruction. However, the U.S., like South Korea, has done little -- officially, at least -- to respond when cyber-savvy nations like China threatened companies like Google Inc. (GOOG) for speaking out about cyberattacks.

South Korean officials are currently investigating the massive SK Comms breach, and are not yet working with Chinese officials.

dikutip dari dailytech.com
semoga bermanfaat
Continue Reading...

"Pwnies" are the Grammies of the Hacker World

Held at Black Hat, the awards celebrate security security expertise, incompetence

Hackers are gearing up for the annual Black Hat convention next month in Las Vegas, Nevada, and already one of the hottest topics is the annual "Pwnie" awards.

Inspired by awards programs like Grammies and the Academy Awards Show, the "Pwnies" celebrate both security super skills and horrific incompetence. They are voted on by professionals in the field of information security -- most of which would be called "grey" or "white" hat hackers.

The awards will be held August 3 and winners, as usual, will receive a painted gold My Little Pony -- a phonetic play on the internet slang "pwn" for being made a fool of (getting "owned on"). "Pwnie" and "pony" are homophones.

Returning categories this year include:
Best Server-Side Bug
Best Client-Side Bug
Best Privilege Escalation Bug
Most Innovative Research
Lamest Vendor Response
Best Song
Most Epic FAIL
The "Most Epic 0wnage" category has been add, as well. Competitors include the prolific LulzSec who hacked Sony Corp. (TYO:6758) and others [1][2][3][4][5][6][7] [8][9][10][11][12][13][14][15] earlier this year and Bradley Manning/Wikileaks who raised an international ruckus by publishing U.S. State Department and Department of Defense secrets [1][2][3][4][5].

Speaking of Sony, the company has been nominated multiple times for the "Epic FAIL" award. In fact, it's this year's only listed nominee.

One of the best song nominations -- George "GeoHot" Hotz's rap ditty "The Light It Up Contest" [video] -- is also Sony related. The song was written in response to Sony's lawsuit against GeoHot for jailbreaking the PS3.

It contains such gems as:
I shed a tear everytime I think of Lik Sang
But shit man, they're a corporation
And I'm a personification of freedom for all
You fill dockets, like thats a concept foreign to y'all
While lawyers muddy water and TROs stall
Out of business is jail for me
And you're suing me civilly.

Exhibit this in the courtroom
Go on, do it, I dare you.

Sony eventually settled with GeoHot.


dikutip dari dailytech.com semoga bermanfaat

Continue Reading...

Visa, PayPal, MasterCard Continue to Work with Copyright Groups

Copyright groups continue global crackdown on piracy, and want to use even more creative measures


The International Federation of the Phonographic Industry (IFPI) is now working with PayPal and other money services to try and put the squeeze on organized internet music websites.

A coordinated effort by copyright groups; governments; and PayPal, Visa, and MasterCard are now limiting how some torrent sites are able to collect funds from members. Since many file sharing sites operate from collected online donations, prohibiting some payment plans helps disrupt these services and forces them out of business.

In the U.S. and select markets, copyright groups are targeting specific groups to try and fight online piracy. Recently, the IFPI reached agreements with Visa and MasterCard, and the City of London Police are then called in to enforce any court documents. After the IFPI notifies local police authorities and credit card companies, the payments are interrupted after the police further investigate the case.

"Once the police have verified the evidence, they notify MasterCard and Visa who require the acquiring bank providing the retailer with payment services to produce evidence of appropriate licenses to sell music or cease providing those services to the retailer," according to the IFPI.

After a failed attempt to directly sue individual peer-to-peer pirates, copyright groups shifted gears and found a new anti-piracy approach. Along with working with the Immigration and Customs Enforcement (ICE) and other federal programs, copyright groups strong-arm ISPs to police their own subscribers. The United States is quickly catching up to other governments that have already launched three-strikes laws and similar legislation to slow down piracy.

The so-called Sinde Law in place in Spain -- a surprising hotbed for copyright infringement -- may help attract U.S. companies according to myce. The law hopes to crack down on websites that commit piracy, hopefully forcing them to turn into legitimate businesses. Other governments are using three-strikes laws and other different methods to try and combat online piracy, although it has become clear there are no easy answers.

Regardless of actual results, copyright groups will continue to try to protect their copyrighted works however possible. Similar laws and coordinated efforts between police authorities and credit services will also progress into the future.


dikutip dari dailytech.com
semoga bermanfaat
Continue Reading...

Wednesday, July 27, 2011

Bukan Kegagalan

Tidak ada kata kegagalan, yang ada hanyalah, hasil yang tidak sesuai harapan
Continue Reading...

Thursday, July 21, 2011

Tetap semangat

Tetaplah menyimpan rasa semangat dalam dirimu, meski pada saat itu kamu mengalami saat-saat yang tidak menyenangkan
Continue Reading...

Sunday, July 17, 2011

Try not to be weak at all

try not to be weak at all
Continue Reading...

Saturday, July 16, 2011

Semangat

Harus tetap semangat....
Continue Reading...

Friday, July 15, 2011

Everyone's emotions begin to move

Everyone's emotions begin to move
Continue Reading...

Thursday, July 14, 2011

Miracle

Miracles can only be bestowed on those who have the willingness to accept.

Keajaiban-keajaiban hanya bisa dianugerahkan pada mereka yang punya kemauan untuk menerimanya
Continue Reading...

Tuesday, July 12, 2011

There are times when a man must stand and fight

There are times when a man must stand and fight

Ada saatnya seorang pria harus berdiri dan bertarung

Continue Reading...

Kejutan Kecil

Hidup ini penuh dengan kejutan-kejutan kecil
Continue Reading...

Download Revo Uninstaller

Woke, kali ini saya akan berbagi ilmu mengenai aplikasi. Dari judulnya mungkin sudah bisa ditebak program apakah ini, benar, ini adalah program penghapus program atau perangkat lunak yang sudah tidak lagi diinginkan lagi hadir dalam sistem operasi komputer kita, haha.

Padahal dari sistem operasi windows sendiri sudah menyediakan menu untuk menghapus aplikasi-aplikasi (add/remove program), lalu kenapa mesti pakai tool tambahan seperti ini ?

Eits, tunggu dulu, jangan salah. Memang benar bahwa windows sudah menyediakan menu untuk menghapus aplikasi-aplikasi yang kita instal dalam sistem operasi, tapi apakah teman-teman pernah mengecek apakah aplikasi-aplikasi yang diinstal, semuanya tertera dalam menu add/remove program ? Tentu sebagian besar tertera, tapi ada beberapa aplikasi yang tidak muncul dalam daftar menu tersebut. Lantas bagaimana cara menghapus aplikasi yang sudah terlanjur terinstal tersebut, sedangkan di menu add/remove programnya tidak muncul, apa harus dihapus secara manual ? Wah tentu merepotkan sekali dan juga sisa-sisa file aplikasi masih ada yang tertinggal, belum lagi daftar aplikasi tersebut di bagian registry. Repot bukan. Untuk itulah aplikasi Revo Uninstaller ini hadir, meskipun ini hanyalah aplikasi tambahan, namun melihat dari segi kinerja dan performanya, tidak ada salahnya untuk dicoba.


Revo Uninstaller ini dapat dengan mudah digunakan untuk menghapus perangkat lunak dan program yang sudah tidak diinginkan lagi di komputer. Bahkan jika teman-teman memiliki masalah untuk menghapus program seperti yang sudah dijelaskan diatas, yaitu masalah menghapus program yang tidak muncul dalam menu add/remove program.

Aplikasi ini merupakan alternatif yang lebih baik dan cepat dibandingkan dengan menu add/remove program bawaannya windows. Dengan metode algoritma yang maju, aplikasi ini melakukan analisa data sebelum dilakukan penghapusan data, setelah penghapusan program dilakukan, aplikasi ini akan melakukan scan terhadap data-data program yang dihapus tadi. Revo Uninstaller menawarkan beberapa metode sederhana, mudah dalam penggunaan, namun efektif di dalam melakukan penghapusan program, seperti menelusuri program selama instalasi.


Jadi jangan ragu untuk mencobanya...

Download dari situs resminya.

Download dari indowebster

Continue Reading...

Doubts

There are doubts in your heart,
You should be able to fight it,
You can and you can certainly do that,
Continue Reading...

Sunday, July 10, 2011

Apple Didenda Rp 68 Miliar karena Ipod

Apple dinyatakan melanggar paten teknologi dalam salah satu produk populernya, pemutar musik iPod. Perusahaan yang didirikan Steve Jobs ini pun harus membayar sejumlah denda pada pemegang paten.

Juri pengadilan menyatakan Apple melanggar paten terkait teknologi 'downloadable playlist' milik pemegang paten, yakni perusahaan Personal Audio. Keputusan ini membuat Apple harus membayar denda sejumlah USD 8 juta atau sekitar Rp 68 miliar.

Personal Audio sebenarnya meminta ganti rugi sejumlah USD 84 juta ketika mendaftarkan gugatan pada tahun 2009. Namun tampaknya perlawanan hukum Apple berhasil sehingga mereka dapat menekan jumlah tersebut secara signifikan.

Apple sendiri merasa tidak pernah memakai paten teknologi milik Personal Audio tersebut. Namun pengadilan memutuskan hal yang sebaliknya.

Jumlah USD 8 juta sendiri terbilang sangat kecil bagi Apple. Dari penjualan iPod di tahun lalu saja, mereka membukukan pendapatan USD 8,3 miliar.


Haha, uang denda yang harus dibayarkan seolah tidak ada apa-apanya.


dikutip dari detikinet
Continue Reading...

Anonymous meng-hack Jaringan Kontraktor FBI

Para hacker yang menyatakan diri mereka "Anonymous' AntiSec Campaign" telah menyusup ke jaringan IRC Federal, sebuah perusahaan rekayasa yang bekerja dengan beberapa lembaga federal termasuk juga FBI.

Kelompok hacker mengklaim telah memperoleh akses ke server web kontraktor, database email, login VPN dan informasi lainnya.

"Dalam email mereka(lembaga federal dan FBI), kami menemukan berbagai kontrak, skema pengembangan, dan dokumen internal untuk berbagai instansi pemerintah termasuk proposal FBI untuk mengembangkan proyek Special Identities Modernization (SIM) dalam rangka mengurangi aktivitas teroris dan para kriminal dengan melindungi semua catatan yang  berhubungan dengan pihak individu yang terpercaya (mungkin maksudnya mata-mata) dan mengungkapkan identitas orang-orang yang dapat menimbulkan resiko serius bagi warga Amerika Serikat dan sekutunya".

"Kami juga menemukan sidik jari kontrak masalah pengembangan DOJ Biometric untuk militer dan kontrak strategi National Nuclear Security Administration Nuclear Weapons Complex", tulis para hacker.

Setelah mencuri data, beberapa data tersebut lalu disebarkan di dunia maya dan para hacker menghapus database perusahaan itu kemudia men-deface website tersebut.

"Kami melaporkan ke pihak berwenang dan kami tidak berkomentar mengenai hal tersebut", kata seorang juru bicara IRC Federal New York Times, sementara pihak FBI enggan untuk berkomentar.

Kompromi dilakukan oleh pihak IRC Federal terkait para hacker yang mengakui bahwa mereka telah berhasil menemukan login untuk third-party VPNs dan Departemen Sistem Energi.

Dalam pengumuman mereka, mereka juga menjelaskan bagaimana para hacker beraksi. Seperti biasa, dimulai dengan kerentanan SQL injection vulnerability untuk mengekstrak kredensial administratif. Kemudia para hacker menemukan script untuk meng-upload gambar pada situs. Script ini memiliki kredensial daftar hitam untuk mencegah upload kode dieksekusi, namun tidak terjawab, termasuk file berekstensi .cfm

Dari sana para hacker mendownload database phpbb forum internal yang berisi password hash. Beberapa dari mereka meng-crack email para pekerja IRC Federal.

Semua vektor serangan, injeksi SQL, hash password crackable, password kembali, juga dimanfaatkan dalam serangan terhadap HBGary federal awal tahun ini. Orang akan berpikir bahwa Federal dan kontraktor IRC lainnya akan belajar sesuatu dari kejadian itu.


sumber : softpedia

semoga bermanfaat yooo

Continue Reading...

Don't lie to yourself

Don't lie to yourself
Continue Reading...

Saturday, July 9, 2011

Pentagon Dirikan Medan Latihan Tempur Cyber

Dalam beberapa bulan terakhir, kelompok hacker seperti LulzSec memberi sinyal bahwa tidak ada satupun yang luput dari serangan cyber. Reuter melaporkan, dalam upaya membantu seseorang menangkal ancaman berbasis web di AS, Pentagon Defensi Advanced Research Project Agency (DARPA) mengembangkan suatu medan pertempuran virtual yang akan online paling cepat tahun depan.



Menurut Reuter, program yang diberi nama National Cyber Range akan menjadi sarana latihan bagi prajurit virtual untuk mengasah kemampuan mereka dan akan beroperasi pada pertengahan tahun 2012.



Pengembangan National Cyber Range dilakukan sejak tahun 2008, ketika Pentagon melibatkan kontraktor untuk membangun program. Lockheed Martin, yang baru-baru ini merupakan korban serangan cyber, pada bulan Januari 2009 memperoleh kontrak senilai $5.4 Juta USD untuk tahap awal pengembangan National Cyber Range. Perusahaan kemudian diberikan dana $30.8 juta USD pada bulan Februari 2010 untuk pengembangan tahap kedua.



National Cyber Range akan menjadi suatu koleksi “testbed” yang dapat digunakan untuk latihan secara mandiri atau sebagai bagian suatu operasi. Reuter menyatakan, salah satu tujuan utama NCR untuk menjalankan misi rahasia secara multi serta program latihan dengan sangat cepat, sehingga membutuhkan suatu sistem yang dapat menghapus data dan melakukan reboot secepat mungkin.



Reuter merujuk dua program lain DARPA yang dalam tahap proses terkait dengan cyber, yaitu Clean-slate Desigen of Resilient, Adaptive, Secure Host (CRASH) dan Cyber Insider Threat (CINDER). CRASH difokuskan untuk merancang sistem komputer baru yang tahan terhadap serangan cyber dan dapat beradaptasi setiap saat. Sementara CINDER fokus dalam mendeteksi spionase tersembunyi pada jaringan komputer.



Cinder berkembang dari skandal WikiLeaks yang terjadi tahun lalu, dimana seorang analis angkatan darat Bradlet Manning ditangkap karena memberikan informasi kepada website WikiLeaks. DARPA menurut Reuter, juga mengembangkan Cyber Genome yang secara otomatis dapat mencari, menidentifikasi dan menganalisa kode berbahaya untuk membantu mengidentifikasi pelaku.

dikutip dari bhineka.com
sumber : pcmag.com

Semoga berguna
Continue Reading...

Friday, July 8, 2011

Zuckerberg Talks Google+, Google+ Not Ready for Businesses

Zuckerberg explains why Facebook is the number one social network, and why it will likely remain that way despite new competitor Google+


With over 750 million active monthly users, Facebook has a solid position in the social networking industry. But with Google+ on its way, many are wondering if it could be a true rival to Facebook. Facebook CEO Mark Zuckerberg answered this question yesterday at the introduction of Facebook video chat, saying that many websites are becoming more social these days, but added that Facebook is unique in that it specializes in socializing.

Zuckerberg said that the last five years have been about connecting people while the next five years will be about connecting apps, and that many companies will look into making their apps more social. He also added that Google isn't the only company releasing a social app, but companies like Netflix have expressed interest in doing so as well. It's all about who will build the best app, because if one doesn't, the other will, he said.

After mentioning that he has spent little time on Google+, Zuckerberg went on to explain why Facebook is the number one social network, and why it will likely remain that way. He has four reasons for thinking this way: Facebook is strictly a social network, people don't want to manage groups, everyone is already on Facebook, and Facebook's video chat is more appealing. However, Zuckerberg never directly spoke of Google by name when discussing these points.

"Companies doing one thing will always do better than companies doing a million things," said Zuckerberg.

Google, for example, has invested in search, music, mobile phones, advertising, etc.

As far as managing groups go, Zuckerberg believes that it's time consuming and very focused. With Facebook's group feature, people within a group know whom they are grouped with. But Google's Circles doesn't allow people to know how they are categorized and with whom. Everything revolves around what you're sharing with whom, which, Zuckerberg believes is time consuming.

An obvious advantage that Facebook has is its 750 million users. Many people already have most of their friends and family on Facebook, and will be reluctant to switch to another network if all of these people do not go with them.

Facebook just announced its video calling feature yesterday, which is a joint venture with Skype that allows users to have one-on-one video chats. Zuckerberg believes this is a better system than a multi-person video chat (much like Google+'s Hangouts, which allows users to video chat with up to 10 people at one time) because "the vast majority of chat is 1 to 1 today."

Whether Zuckerberg is right or wrong about any of the above will play out in time, but for now, he doesn't have to worry much since Google has admitted that Google+ needs some work in certain areas, such as making the service business-friendly.

Google Group Product Manager Christian Oestlien noted on his Google+ page that the way businesses communicate is different from how individuals communicate, and that this is something Google is working on.

"We want to create an optimal experience for both," said Oestlien. "We have a great team of engineers actively building an amazing Google+ experience for businesses, and we will have something to show the world later this year."

In fact, Oestlien discourages businesses from making Google+ pages in its current format, and will shut down any businesses trying to connect with users at this time.

While Google+ won't launch anything business-friendly for a bit, there is a small pilot program that businesses can sign up for to test the waters.


dikutip dari dailytech.com semoga bermanfaat, sekalian belajar bahasa inggris
Continue Reading...

Penawaran Fitur Chatting Terbaru Facebook, Video Calling Bersama Skype

Tentu rekan-rekan sudah tau situs jejaring sosial yang satu ini, FACEBOOK. Jawabannya sudah pasti. Situs jejaring sosial ini sudah sangat populer di seluruh dunia, bahkan tiap orang sudah memiliki akun di situs tersebut.

Bahasan kali ini adalah tentang fitur chatting yang terdapat pada facebook. Untuk fitur chatting ini, facebook memperkenalkan teknologi barunya dengan menggandeng skype, yakni skype video calling. Jelas nama SKYPE sudah tidak asing lagi di telinga rekan-rekan yang doyan akan layanan situs-situs sosial ini.

Facebook berupaya untuk selalu membuat perubahan yang relevan dan juga bersaing, terutama untuk saingan terbarunya kini, yakni Google+. November lalu facebook memperkenalkan sistem messaging yang menyediakan layanan teks, chatting, email dan pesan bersama-sama dalam satu wadah, juga penyediaan teknologi yang dapat men-tag foto dengan cara yang mudah. Kini facebook memperkenalkan fitur chatting terbaru agar dapat berkirim pesan secara real-time dengan teman dan keluarga dengan lebih nyaman.

Fitur chatting terbaru ini menawarkan model sidebar seperti chat sidebar yang rekan-rekan bisa lihat pada facebook sekarang ini. Fitur lainnya yaitu obrolan chatting multi orang, pada fitur ini rekan-rekan bisa mengundang teman-teman ke dalam sebuah grup chat.

Last but not least, facebook sedang bekerja sama dengan skype memperkenalkan video calling sebagai fitur chat terbaru. Opsi video calling ini terdapat pada fitur chat, dimana tombol video call terletak di bagian atas jendela chatting. Video calling ini tersedia untuk 70 bahasa yang berbeda dan ini akan diuji cobakan beberapa minggu ke depan pada situs jejaring sosial facebook ini.


Semoga postingan ini bisa menambah wawasan rekan-rekan sekalin.

Salam IT

Continue Reading...

Wednesday, July 6, 2011

Think always about what have you done

Think always about this:
What have I done today


Renungkanlah selalu tentang hal ini :

Apa yang sudah kulakukan hari ini
Continue Reading...

Everything can be obtained by concentrating

Everything can be obtained by concentrating, depending on how much concentration to want something


Segala sesuatu bisa didapatkan dengan berkonsentrasi, tergantung pada seberapa besar konsentrasi untuk menginginkan sesuatu

Continue Reading...

Keep Fighting Despite Facing Storm

Do not expect to get the easy road, there will be a difficult roads in the journey.
Do not let adversity stop you, keep running even though the storm frighten you, do not ever sit back and complain, but think how nice tension.
Look at the terrain that unfolds with a sense of joy, do not let adversity stop you, think of it merely as a difficult obstacle that must be overcome before the peak at destination


Jangan berharap mendapatkan jalan yang mudah, bakal ada jalan-jalan yang sulit dalam perjalanan.

Jangan biarkan kesulitan itu menghentikan anda, teruslah berjalan meski badai menggentarkan anda, jangan pernah berpangku tangan dan mengeluh, namun pikirkanlah betapa menyenangkan ketegangan itu.
Lihatlah dataran yang terbentang dengan rasa gembira, jangan biarkan kesulitan menghentikan anda, anggaplah kesulitan itu semata sebagai hambatan yang mesti diatasi sebelum mencapi tujuan
Continue Reading...

One of The Screet to Success

the secret to success is always trying to improve ourselves, no matter wherever you are and whatever your job, learn everything you get, do not see how little work it can do, but look how many things can be done


Rahasia kesuksesan adalah selalu berusaha meningkatkan diri, tidak peduli dimana pun anda berada dan apapun jabatan anda, pelajarilah semua yang anda dapatkan, jangan melihat seberapa sedikit pekerjaan yang dapat dilakukan, tetapi lihatlah betapa banyak hal yang bisa dikerjakan

Continue Reading...

Besarkanlah Hati Orang Lain

will come when we all need advice and encouragement, so get used to encourage other people, because you will get back the motivation and thinking of fun


akan tiba saat kita semua membutuhkan saran dan dorongan, jadi biasakanlah membesarkan hati orang lain, karena anda bakal mendapatkan kembali motivasi dan pemikiran yang menyenangkan

Continue Reading...

Tuesday, July 5, 2011

Take Courage

Kuatkanlah hatimu, brother


Take courage, brother

Continue Reading...

Do not let your spirit fire extinguished

Jangan biarkan api semangatmu padam


Do not let your spirit fire extinguished

Continue Reading...

Strong

Harus kuat dalam menjalani hari demi hari
Continue Reading...

You must be a strong person every day

Kamu harus menjadi orang yang kuat tiap hari


You must be a strong person every day

Continue Reading...

Think abaout success

Always think about success, then success will come to you
Continue Reading...

Sunday, July 3, 2011

Google Introduces Possible Facebook Rival: "Google+"

Google+ is available on the Android Market and the mobile web starting today, and will be available on the App Store soon


Since Facebook's launch in 2004, it has established itself as an unrivaled social networking superpower. No one has been able to match its broad audience and number of features, but now, Google will give it a shot with a new project called Google+.

Google made the argument that existing online interactions are awkward and needs a "fix." For instance, in current instant messaging systems, someone may seem available on the list, but when you actually message them and they don't respond, you're not sure if they're away or not interested. Also, Google made mention that users mainly want to connect with certain people at certain times, but current social networking systems put everything out there at once and makes everything you say a "public performance."

To remedy these issues, Google has created Google+ which offers four key features that were created specifically for the user: Circles, Sparks, Hangouts, and Mobile.

Circles allow users to create multiple categories of family and friends, each within their separate circle. For instance, one circle can be the family circle, another can be best friends, another can be the basketball team you play on, and so on. This allows the user to share what they want with whom they want instead of sharing everything across the board.

Sparks is an online sharing engine that allows users in certain circles to share information based on their interests. For instance, if you have a circle of friends that are into comic books, Sparks provides relevant articles, videos and photos that give you and your circle of comic book-loving friends something to discuss and enjoy together. It allows you to "spark" a conversation. It also filters and delivers the most "contagious" content on the web, so the need for time-consuming searches is eliminated.

Hangouts is Google+'s version of instant chat, but is a face-to-face chat instead. Google claims that instant messaging is too intrusive, and that it always disrupts someone in the middle of something. But with Hangouts, users can partake in casual meet-ups in a live multi-person video whenever they have some free time, which lets other users know that you're really there (not idle) and interested in hanging out.

Mobile is aimed to allow users to communicate on the move. Features offered in Google+'s mobile realm are ways of marking your current location, an "Instant Upload" feature that stores photos from your phone in the cloud and allows you to decide if you want to share them on the web, and a "Huddle" feature that makes it easy for a user to use group messaging to get a group of friends together or exchange information.

Google+ was built from the ground up to revolve around the user, and to revolutionize the social networking experience by making it more similar to how we actually communicate. Google is only calling it a project for now, and while it seems interesting enough, only time will tell if it can stand up to Facebook's level.

For instance, Facebook already has some of the features offered above, such as Facebook's Lists and Groups that acts much like Google+'s Circles. Yet Google+'s Circles offers an easy drag and drop feature that may prevail over Facebook's system. In addition, Facebook has pages of interest that users can "like" and share information regarding that topic on that page, but Facebook's pages can have thousands of users that you do not know associated with that interest page, where Google+'s Sparks allows topics to be discussed among you and your circle alone.

Of course, both networking systems have a mobile setup and video chats. They also look very much alike, according to the screenshot Business Insider provided after being invited to the new field trial.

Google+ is available on the Android Market and the mobile web starting today, and will be available on the App Store soon. Right now, Google is conducting a field trial (hence why its called a project right now) where users can use the new features and let Google know what they think and what needs to be changed.

Sumber : dailytech.com
Continue Reading...

Hackers Kill 4,800 Australian Sites Thanks to Brutal Attack on Web Host

Web host says sites are unrecoverable

It's every web administrator's worst nightmare -- your online presence is totally destroyed in a service outage. That's precisely what happened when Australian domain registrar and web host Distribute.IT was attacked.

Over 4,800 websites were reportedly lost when the hackers struck last Saturday, as four servers were reportedly left unrecoverable. The company comments:

The overall magnitude of the tragedy and the loss of our information and yours is simply incalculable; and we are distressed by the actions of the parties responsible for this reprehensible act.

At this time, We regret to inform that the data, sites and emails that were hosted on Drought, Hurricane, Blizzard and Cyclone can be considered by all the experts to be unrecoverable," it said.

While every effort will be made to continue to gain access to the lost information from those hosting servers, it seems unlikely that any usable data will can be salvaged from these platforms.

In assessing the situation, our greatest fears have been confirmed that not only was the production data erased during the attack, but also key backups, snapshots and other information that would allow us to reconstruct these servers from the remaining data.

The company promises to help customers "transfer your hosting and email needs to other hosting providers."

For large site owners that likely won't be a problem as they likely have save backup copies of their homepage. For smaller operators, though, this could be very bad news, as many of them don't have the resources to save backup copies.

Writes one customer in a local forum, "[The hack] has probably killed my business."

The question remains why Distribute.IT was penetrated so easily and thoroughly. It is also baffling why they chose not to back up their data off-site as most hosting firms do.

As the potential for abuse of the stolen private information of website owners is great, these factors may play a key role in possible future legal proceedings by site owners against the company.


Masih bahasa inggris, belum diterjemahkan, haha sekalian belajar bahasa inggris, dikit-dikit
sumber : dailytech.com
Continue Reading...

Video Pedrosa menolak Bersalaman dengan Simoncelli

Tentu teman-teman para maniak moto gp sudah tau tentang insiden dimana simoncelli menyenggol ban pedrosa dan membuat pedrosa jatuh, dan parahnya lagi karena kecelakaan yang dialami pedrosa tersebut membuat bahu kanan pedrosa terluka dan harus beristirahat selama beberapa pekan. Tentu ini membuat peluang pedrosa untuk menjadi juara moto gp musim 2011 menjadi tertutup.

Saya tidak akan berbicara banyak, langsung aja nonton videonya, dimana dalam video itu terlihat pedrosa enggan membalas salaman yang dilakukan oleh simoncelli.


Continue Reading...

Laporan GAO: Pentagon Harus Memberikan Pelatihan yang lebih baik untuk Sistem Komando Keamanan Cyber Baru

Komando Cyber ​​baru sedang diberlakukan di pangkalan di Fort Meade di Maryland bersama dengan Badan Keamanan Nasional


Tahun ini telah diragukan lagi, hal itu ditandai dengan beberapa serangan cyber yang paling sering dan berani sejak tahun 1990-an. Sejak 4 Januari, kelompok-kelompok hacker seperti Anonim, Goatse Security dan LulzSec (alias "Lulz Security") telah meluncurkan web terkait serangan pada Sony, Lockheed Martin Corp, Gmail account, Bank of America dan sektor-sektor pemerintah yang berbeda di seluruh dunia termasuk di Tunisia, Inggris dan Spanyol.

Target pemerintah di Amerika Serikat telah menjadi US Central Intelligence Agency, sebuah afiliasi dari US Federal Bureau of Investigation dan US Senat server.

Selain itu, LulzSec dan Anonim telah bergabung untuk "menyatakan perang" pada pemerintah AS dan internasional serta bank. Sejauh ini, LulzSec telah meluncurkan lebih dari 18 serangan utama dan Anonim telah meluncurkan lebih dari 11 serangan.

Masalah keamanan menjadi sorotan utama para hacker meluncurkan serangannya. Bahkan, Government Accountability Office (GAO) merilis sebuah laporan pada Senin mengatakan bahwa Pentagon di tengah-tengah mendirikan US Cyber ​​Command baru. Tapi itu tidak cukup untuk menjamin akhir serangan cyber, pemerintah juga harus "menetapkan tenggat waktu untuk lay out pedoman lebih rinci tentang bagaimana tenaga kerja cyber bekerja bersama-sama."

Departemen (DOD) Pertahanan jaringan komputer sangat beresiko, menurut GAO. Jaringan komputer departemen-scan jutaan kali sehari, dan sangat penting bahwa keamanan ditingkatkan sebanyak mungkin. Untuk mengatasi masalah ini, Cyber ​​Command baru sedang diberlakukan di pangkalan di Fort Meade di Maryland bersama dengan Badan Keamanan Nasional.

Seiring dengan Cyber ​​Command baru, Pentagon juga harus membuat program pelatihan baik untuk staf. Ini akan mengidentifikasi pekerjaan maya cocok untuk anggota militer dan warga sipil. Selain itu, laporan GAO menyarankan bahwa peta Pentagon keluar struktur dan tugas Angkatan Laut, Angkatan Darat, Laut dan Angkatan Udara maya komponen yang terkait dengan Cyber ​​Command baru.

Robert Butler, wakil asisten menteri pertahanan untuk kebijakan cyber, menanggapi laporan GAO dengan mengatakan bahwa Pentagon adalah menangani masalah ini, namun saat ini belum ada "waktu untuk penyelesaian."

Sumber : dailytech.com
Continue Reading...

Everything is not Achieved Easily

"Everything is not achieved easily"

Certainly there are difficulties to be faced,
Strange if the success achieved without difficulties,


"Segala sesuatu tidak diraih dengan mudah"

Pastilah ada kesulitan yang harus dihadapi.

Terasa aneh jika keberhasilan diraih tanpa kesulitan-kesulitan.


H. Yulian Putra

Continue Reading...

Manfaat Penerapan E-KTP

Berikut manfaat-manfaat dengan diterapkannya E-KTP yang saya kumpulkan dari berbagai sumber:

  • meminimalisir konflik horizontal pada saat pemilihan kepada daerah. Dengan adanya E-KTP dapat mencegah munculnya pemilih ganda dan mencegah terjadi penggelumbungan suara, termasuk dalam pemilu,
  • mencegah ancaman teroris,
  • mencegah tenaga kerja ilegal,
  • pembelian tanah dengan bermacam KTP,


Manfaat lain akan saya update selanjutnya.

Continue Reading...

Menuju KTP Elektronik

"Menuju KTP Elektronik", hm, kedengarannya kurang kuat judul dari postingan saya kali ini dan juga terbilang terlambat, padahal rencana pembuatan elektronik ktp atau istilahnya E-KTP, sudah dibicarakan sebelum menginjak 2011. Tapi tidak apa-apa, kita akan pelajari bersama E-KTP ini.

Seiring perkembangan zaman yang semakin canggih dan modern, berbagai teknologi-teknologi bermunculan secara cepat seiring berjalannya waktu. Perkembangan ini tidak dapat dihindarkan lagi dan telah menjamur ke berbagai aspek kehidupan, contohnya saja e-commerce, e-banking, e-learning, e-book, e-goverment dan masih banyak lagi. Tentunya teknologi-teknologi tersebut lahir dengan harapan akan menggantikan sistem lama ke sistem yang baru dengan berbagai perbaikan-perbaikan yang membuat penyampaian informasi menjadi lebih baik, efektif dan efisien serta penggunaannya yang membantu proses dan kinerja menjadi lebih signifikan. Salah satunya adalah E-KTP ini.

Tahun 2011 pemerintah pusat melalui kementerian dalam negerinya menerapkan penggunaan KTP Elektronik atau E-KTP. Penerapan E-KTP ini diharapkan akan dapat meningkatkan keamanan negara, karena terdapat banyak sekali bentuk kejahatan yang mungkin saja bisa terjadi karena faktor lemahnya sistem KTP yang ada saat ini, contoh konkritnya adalah pemalsuan KTP dimana identitas seseorang bisa berubah-ubah.

Penerapan E-KTP
Terdapat 197 kabupaten/kota di seluruh Indonesia yang akan menerapkan E-KTP pada tahun ini, salah satunya adalah Jakarta. Edi Supriyadi selaku Kepada Bidang Penertiban dan Kerjasama Dinas Kependudukan dan Catatan Sipil Provinsi Jakarta mengatakan bahwa proyek ini dalam proses persiapan dan nanti untuk penerapannya akan dimulai pada bulan agustus 2011, untuk sosialisasinya dilakukan sebulan kemudian. Penggunaan E-KTP ini memiliki banyak manfaat, salah satu contohnya adalah akurasi data penduduk yang lebih baik sehingga penyalahgunaan identitas dapat diminalisir. Direncakanan target penerapan E-KTP ini akan mencakup 197 kabupaten/kota dengan 97 juta jiwa masyarakat, selanjutnya di tahun 2012 mencakup 300 kabupaten/kota dengan 105 juta jiw

Masalah Biaya dalam Pembuatan E-KTP
Berdasarkan informasi yang beredar, bahwa untuk pembuatan E-KTP ini tidak perlu mengeluarkan biaya atau dengan kata lain GRATIS, demikian yang disampaikan oleh pemerintah. Tapi untuk kenyataannya, saya meragukan akan hal tersebut, mungkin nantinya terdapat satu atau dua, bahkan beberapa kelurahan yang memunguti biaya untuk pembuatan E-KTP ini. Jelas ini berlawanan dengan apa yang telah disampaikan oleh pemerintah, tentu ini akan menjadi ironis ketika nanti dalam pelaksanaannya terdapat pihak-pihak yang mendapatkan keuntungan yang seharusnya tidak mereka dapat. Semoga saja hal ini tidak menjadi kenyataan dan sesuai dengan yang disampaikan oleh pemerintah kepada kita semua, yakni pembuatan E-KTP ini adalah gratis.

Kita semua, baik pemerintah dan kita sebagai masayarakat yang berada dalam Negara Kesatuan RepublikIndonesia berharap dengan adanya E-KTP ini akan membawa Indonesia menjadi yang lebih baik lagi.


Oleh : H. Yulian Putra
Continue Reading...

Believe in Yourself

You must believe in yourself,
Believe in the ability you have,
Do not doubt it,
You can certainly do all the tasks that will be given to

H. Yulian Putra
Continue Reading...

Saturday, July 2, 2011

Virus DDLight Infeksi 50 Aplikasi Android

Serangan program jahat (malware) terhadap sistem operasi Android kembali terdeteksi. Varian ini bernama DroidDream Light (DDLight) yang merupakan evolusi dari versi sebelumnya, Myournet/DroidDream.

Para analis malware mensinyalir pembuat malware tersebut sedang mengembangkan varian baru dari DDLight. Serangan DDLight ke Android sendiri dilaporkan telah menginfeksi lebih dari 50 aplikasi di pasar Android.

Menurut perusahaan keamanan Eset, DDLight oleh para analis dianggap versi yang ringan sebagaimana versi sebelumnya. Namun faktanya mampu mengakibatkan kerusakan yang lebih tinggi, terutama karena malicious apps tidak membutuhkan peran manusia atau user untuk melakukan start up aplikasi secara manual sehingga trojan bisa bekerja.

Sebaliknya, kode pada smartphone tersetting untuk melakukan start up saat perangkat smartphone tersebut menerima panggilan telepon.

"DroidDreamLight kemudian akan menginstall aplikasi tambahan ke dalam perangkat yang baru dimasukinya. Berikutnya, malicious apps tersebut akan berintegrasi sehingga mampu melakukan aktifitas kejahatan, seperti pencurian data," lanjut Eset.

Situasi keamanan perangkat komunikasi mobile saat ini dinilai Eset masih terbuka, tanpa sistem keamanan yang memadai. Hal ini patut diwaspadai, mengingat para pelaku kejahatan dunia maya sedang mengembangkan perangkat untuk melakukan serangan.

"Jika para pelaku kejahatan telah mulai memfokuskan diri pada perangkat mobile dengan OS yang pernah diserang, seperti Windows Platform, maka saat itulah mobile malware dan phishing akan mencapai tingkat epidemi," tukas Eset, dalam keterangannya, Selasa (21/6/2011).


dikutip dari detikinet, semoga bermanfaat
Continue Reading...

Pendiri Facebook Lebih Kaya Ketimbang Pendiri Google

Semakin banyak keberuntungan menyelimuti pendiri Facebook Mark Zuckerberg. Kabar terakhir bahkan menyebutkan jika mantan mahasiswa Harvard itu kini lebih kaya ketimbang dua pendiri Google, Sergey Brin dan Larry Page.

Melonjak pesatnya kekayaan pribadi pemuda pembesut situs jejaring sosial paling populer itu salah satunya diprediksi berkat adanya investasi baru yang masuk ke Facebook.

Awal pekan ini, sebuah perusahaan bernama GSV Capital Corp membeli 225 ribu lembar saham Facebook dengan harga per lembarnya rata-rata adalah USD 29,28. Saham ini meningkatkan nilai Facebook hingga berada di kisaran USD 70 miliar.

Investasi baru ini, berdasarkan majalah Time turut meningkatkan pundi-pundi kekayaan Zuckerberg menjadi USD 18 miliar. Setelah pada awal tahun, 'cuma' menyentuh angka USD 13,5 miliar. 

Hebatnya lagi, kini jumlah harta Zuckerberg diyakini telah melampaui duo pendiri Google -- Sergey Brin dan Larry Page -- yang kekayaannya diperkirakan menurun menjadi USD 17 miliar dari USD 19,8 miliar Maret silam.

"Dengan valuasi baru, Zuckerberg mengungguli dua pendiri Google, Sergey Brin dan Larry Page, yang kekayaannya diperkirakan telah menurun," demikian bunyi laporan Time.

Perkiraan ini juga membuat Zuckerberg menjadi orang terkaya nomor tiga di dunia di sektor teknologi, setelah Bill Gates pemilik Microsoft dan Larry Ellison dari Oracle.

Saat ini Gates masih memiliki kekayaan senilai USD 56 miliar, sedangkan Ellison mengantongi kekayaan senilai USD 39,5 miliar sekaligus menempatkannya sebagai miliuner terkaya nomor lima sedunia.

Dikutip dari detikinet, semoga bermanfaat
Continue Reading...

Menghajar Virus Cinta

Ollo (helo gaya megamind) teman-teman,

Mau menghajar seseorang??? Hohoho jangan ya, ndak baik, lebih baik kita menghajar virus cinta saja...

Sudah berkenalan dengan virus cinta ? Sudah tau ciri-ciri virus cinta ? Klo sudah berarti kalian sudah siap untuk menggebuk virus cinta itu...

Langsung aja...kita akan menggunakan teknik yang sederhana dalam menanggulangi kebengisan virus ini, this is it :

1) Hentikan proses virus yang berjalan di memori. Berhubung virus ini terbuat dari VB dan juga virus-virus lokal lainnya, maka kita gunakan tool KillVB untuk menghentikan proses dari virus tersebut. Silakan donlot di sini

2) Tentu registry dari sistem kita sudah diobok-obok oleh sang virus, dan tentu kita sebagai manusia yang normal akan memperbaikinya (yang ga normal ga memperbaiki ^^), karena bagian yang diubah cukup banyak, tentu akan capek memperbaikinya satu per satu, kita gunakan cara instan (ga pake mi).  Kopi script di bawah ini dan paste-kan di notepad lalu save dengan nama REPAIR.INF. Install file tersebut dengan cara klik kanan REPAIR.INF
Kemudian pilih [INSTALL].

Berikut script-nya (maaf ya, banyak banget)


[Version]

Signature="$Chicago$"
Provider=Vaksincom Oyee

[DefaultInstall]
AddReg=UnhookRegKey

DelReg=del
[UnhookRegKey]

HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""
HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"
HKLM, SOFTWARE\Classes\.zip,,, "winzip"
HKLM, SYSTEM\ControlSet001\Control\SafeBoot, AlternateShell,0, "cmd.exe"
HKLM, SYSTEM\ControlSet002\Control\SafeBoot, AlternateShell,0, "cmd.exe"
HKLM, SYSTEM\CurrentControlSet\Control\SafeBoot, AlternateShell,0, "cmd.exe"

[del]

HKCU, Software\noF i T r I on Computer
HKLM, SYSTEM\CurrentControlSet\Services\noF i T r I on Computer
HKLM, SYSTEM\ControlSet001\Services\noF i T r I on Computer
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\noF i T r I on Computer
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, AudioSystem.exe
HKCU, Software\Policies\Microsoft\Windows\system, DisableCMD
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoClose
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFind
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFolderOptions
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoControlPanel
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoRun
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NosaveSettings
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoStartMenuMorePrograms
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoViewContextMenu
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoViewonDrive
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableMsConfig
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegistryTools
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableTaskMgr
HKCU, Control Panel\Desktop,SCRNSAVE.EXE
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, AudioSystem.exe
HKLM, SOFTWARE\noF i T r I on Computer
HKLM, SOFTWARE\Policies\Microsoft\Windows\Installer, DisableMSI
HKLM, SOFTWARE\Policies\Microsoft\Windows\Installer, LimitSystemRestoreCheckPointing
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\0000.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ahnlab.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Avas.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVG.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ccapp.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cclaw.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccleaner.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Cleaner.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleanmgr.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DriverDetective.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DriverScanner.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Fixinstall.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\folderlockbox_setup.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Free Fire Screensaver.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Hunter.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install_flash_player.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ISUNIST.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Kaspersky.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keygen.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\limeware.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LNKSTUB.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mobsync.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSOOBE.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msra.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAPSTAT.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NETSETUP.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nip.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nipsvc.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Niu.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Njeeves.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NOD32krn.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NOD32kui.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Norman.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Norton.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvccf.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcoas.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcod.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcsched.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Panda.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMV-RTP.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppclean.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Procexp.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regdir.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Restore my files.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rminstall.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTRUI.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SecurityConfig.exe.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Smadav 2009 Rev. 3.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmaRTP.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sophos.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symantec.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\st5unst.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supercleaner.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Task.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskkill.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfnotice.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Tiny.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trend.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrendAntiVirus.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojan Hunter.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojan.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanHunter.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TweakUi.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Unins.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Unins000.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Uninst.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Uninstall.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\unlocer.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\unlocker.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UNWISE.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Upd.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Update.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\V2iBrowser.exe.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VProConsole_.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinHIIP.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\unwise32.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\youtubesetup.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ypsr.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ypsrru.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Zanda.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Zlh.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZoneLabs.exe

3) Kemudia kita akan menampilkan kembali file-file yang diumpetin/disembunyikan oleh Windows dengan cara buka Windows Explorer-Tools-Folder Option-View kemudian centangkan opsi show hidden files and folder.

4) Delete -filefile yang dibuat oleh virus tersebut termasuk di flashdisk teman-teman. Cara cepatnya seperti ini, gunakan search (tekan tombol WINDOWS+F), kata kuncinya  *.exe dan *.scr. Awas..jangan sampe salah menghapus ya, salah menghapus diluar tanggung jawab ane (^^). Berikut ciri-ciri file yang dibuat oleh virus ini, hmm, ukurannya 76kb, tidak memiliki icon yang identik, tipe filenya application(.exe) atau screensaver(.scr).

5) Jika langkah 4 di atas sudah dijalankan, selanjutnya adalah membasmi beberapa hama lagi, berikut hama-hama itu :

- OBE.sacura [semua drive]

- Autorun.inf [semua drive]

- Folder [-], semua drive

- Folder [Kasihku], semua drive

- Folder [Koleksi ScreenSaver], semua drive

- C:\WINDOWS\system32\blank.htm

- C:\Documents and Settings\%user%\http_www.patah-hati.com


Untuk mendaptkan hasil yang maksimal, sebaiknya menggunakan antivirus yang selalu ter-update atau bisa menggunakan tools gratis Dr.Web CureIt di sini


Demikianlah postingan ini, bagi teman-teman yang ingin menghajar seseorang, sebaiknya ditunda dulu, perhatikan komputer/laptop kalian dan perhatikan apakah terdapat virus cinta yang bersarang, jika tidak ingin mabuk cinta sebaiknya menghajar virus ini, haha

Semoga bermanfaat ya...

Salam virus

Continue Reading...

Ciri-Ciri Komputer Terserang Virus Cinta

OLLO (gaya megamind) teman-teman...

Sebelumnya kita mendengar sedikit sejarah munculnya virus cinta, dan kali ini kita akan mempelajari ciri-ciri atau tanda-tanda komputer/laptop terserang virus tersebut.

To the point...Tidak terlalu susah untuk mengetahui apakah komputer/laptop yang kita miliki terserang virus cinta atau tidak. Berikut ciri-ciri komputer/laptop yang terserang virus cinta berdasarkan pengamatan lapangan (hehe, pengamatan di dunia maya) :

  1. munculnya beberapa file yang berada pada root folder untuk tiap-tiap disk drive (ex:c:/,d:/,dsb). File-file itu antara lain : a) %tanggal% _ TrueLove.exe, %tanggal%, menunjukan tanggal system komputer (contoh: 30 June 2011 _ TrueLove.exe); b) TransparentScreenSaver...scr; c) Folder [kasihku]; d) Folder [–], folder ini akan disembunyikan; e) Folder [Koleksi ScreenSaver].
  2. akan tampil screensaver pada waktu-waktu tertentu sesuai dengan waktu yang telah ditentukan oleh program jahat ini, dan pada saat screensaver tersebut berjalan, si pengguna komputer/laptop hanya bisa bengong aja alias tidak dapat melakukan apa-apa sampai menunggu pertunjukkan screensavernya berakhir.
  3. Tidak dapat membuka file yang dikompresi (ex: zip, rar, dsb) dan icon dari file tersebut akan berubah.


Woke...sekian untuk postingan kali ini, semoga saja postingan ini memberi manfaat bagi teman-teman yang membacanya...

Salam virus...

Continue Reading...

Beat Yourself with Self-Control

You need self-control.
You should be able to control your own self
Remember there is the greatest enemy, he is your own self

Beat yourself with self-control
Continue Reading...

Friday, July 1, 2011

Munculnya Virus "CINTA"

Kemarin-kemarin kita dikejutkan (bagi yang terkejut ^^) dengan virus HATIPAT, virus yang patah hati (virusnya ato orangnya ni ???), dan kini eng ing eng muncul virus CINTA ato yang dideteksi sebagai Trojan.Siggen1.42827 dan yang membuat virus ini adalah orang indonesia.

Diberitakan bahwa virus ini dibuat karena ada seseorang programmer yang sedang dalam status CINTA yang enable (^#^ apa maksudnya ni???) atau sedang dimabuk asmara, hehe, tapi dia tidak berani untuk meng-output-kan (apa lagi ni??? plak) perasaannya kepada si cewek, wkwkwk. (kyk ane barang kali, tapi ane ga bisa bkin virus...).

Jangan kawatir teman-teman, virus ini tidak bahaya, hanya nakal, nakalnya kenapa??? Nakalnya karena virus ini akan sering memunculkan screensaver pada komputer korban.

Tidak mudah untuk membasmi virus ini, karena ability (bahasa yg keren,,,indo-nya kemampuan) virus ini adalah memblokir dan memblokade berbagai jenis ekstensi file seperti exe, zip, dan rar. Virus ini juga akan mengaktifkan safe mode melalui command prompt.

Jadi...waspadalah-waspadalah...
Continue Reading...
 

Free Download Copyright © 2009