29 Juni 2010

Fake antivirus Got Now Technical Support



In order to boost sales, traders fake antivirus products such as Live PC Care offers direct technical support for their victims.

According to researchers at Symantec, once users install the program, they will see who preach the false appearance that their PC had been infected with some kind of malware. This is a common way to fake antivirus offering his services.

"What is unusual is that it is now a free trial version of Live PC Care provides the 'online support' to such notice," said Marc Fossi, manager of Development, Symantec Security Response, as VIVAnews quoted from PCWorld, February 23, 2010.

Fossi mentioned, with the click of a button, the user will be connected with an agent who will answer any questions users have about the product, via instant message.

"The agent script is not automatic, but a real person. This suggests the validity of these fake antivirus programs, "said Fossi. "Obviously, the user thinks, if the program has a real technical support, software would be nice," he said.

Nevertheless, the technical support provided did not help much. According to Symantec, the service staff just trying to convince the victim to buy a product costing 30 to 100 dollars.

This is not the first time detected a fake security products have technical support services. Previously, the company called Innovative Marketing has operated a call center to support the "security products" they like WinFixer.

According to some security analysts, technicians from the Innovative Marketing applies the same as Live PC Care, they try to convince victims to buy their product.

If you've purchased and installed, the 'virus' is sometimes lowered the security settings on the victim's computer. In addition, they offer a false sense of security because their product actually does not protect a computer from the latest security threats.

Fake antivirus itself has become a frustrating problem for users over the past year. Software is sometimes inadvertently installed through pop-up ads that appear and try to convince the victim that there is a problem on their PC.

During July 2008 until July 2009 then, Symantec itself has noted there are 43 million fake antivirus trial installation of the Internet user's computer.

28 Juni 2010

There are Trojan behind Yahoo and Google Ads




Be careful when interested in online advertising. Because, now many malware (malicious software or malware) that hide behind a variety of online advertising.

Latest findings from researchers from Avast anti-virus companies are quoted from CNet site, uncovering malware-malware that exploit vulnerabilities in a variety of application platforms, Yahoo's ad, Fox, and Google.

Avast security experts say that the most widely ad platform malware is possessed by Yahoo Yield Manager and Fimserve owned Fox Audience Network, which is estimated to reach more than 50 percent of the infected online ads.

In smaller amounts, Google DoubleClick platform and MySpace are also carrying malware. "This is not a small player who has been infected with malware, but an ad server that is connected with Google and Yahoo," said Lyle Frink, Manager of Public Relations of Avast.

Malware found on ads that use Java scripts to by Avast named 'JS: Prontexi'. According to security experts Jiri Sejtko Avast, that script is a Trojan program, which targeted Windows systems.

Trojan was looking for security holes that have Adobe Reader, Adobe Acrobat, Java, QuickTime, and Flash. Although computer users do not click on any links, this trojan will directly infect a computer, immediately after the browser to load (loading) ads that have been possessed by malware.

The ads have been infected with a trojan that had been milling about in cyberspace since last December. According to data Avast, there are approximately 2.6 million customers who have penetrated computer this trojan. Nearly 530 thousand of them get it from the Yield Manager ad, and another 16 300 from Google's DoubleClick.

Persentase iklan yang terinfeksi Trojan

Yahoo representative said it was investigating the matter, but could not provide much information. "We have identified this problem and is trying to incapacitate in our system," said Yahoo to CNet.

Google spokesman also claimed to have found malware on their ads and middle fix this problem. "When our automated system managed to identify this problem, we immediately stop operating the ads that have been exposed to malware, and we will continue to improve our security system," said Google spokesman.

Practice of inserting malware via advertising is starting to bloom. This practice is also called malvertising (malicious advertising). Before this, few ads in the New York Times, TechCrunch, Drudge Report, and also briefly possessed WhitePages.com malware.

27 Juni 2010

Playstation 3 managed to hack



In 2007, a 17-year-old young hackers managed to unlock Apple's iPhone. Now, George Hotz 20-year-old returned to buzz with menghack security systems from Sony's PS3 is rumored to have security holes that are difficult to penetrate. He will announce his findings in the near future according to the BBC.

Hotz takes five weeks to hack the PS3. With the breakdown of this PS3 system, now people will be able to run pirated games or software homemade.

He spent three weeks to analyze the system that has been hailed as the most secure system that. Another two weeks later he passed by her krack console. Hotz hacked the PS3 since last summer.

"Now I can do whatever I want on the system. As an amazing new powers, which I myself do not know how to use them," Hotz said narcissists "But, I have nothing to do with piracy," said Hotz quoted from the BBC, Tuesday January 26, 2010.

Interestingly, Hotz claims that Sony will not be able to fix the cracks it finds. "These findings really hard to patched (patchable), but they could just make those implementations are much more difficult," says Hotz.

Hotz described, the methods break down the PS3 is "5 percent 95 percent hardware and software." Hotz utilize the PS3 hardware to inject into the system to an unsafe condition. "Then you just can menjebolnya."

Uniquely, Hotz himself claimed to have never played a PS3. "Honestly, I've never played a PS3. I have one PS3 game discs, but never played it seriously," said Hotz.

He himself was aware his actions could cause people to play pirated PS3 software. However, Hotz was no specific intent to promote pirated software. Hotz main motivation is curiosity, and how to open platform for secure it in violence.
told the BBC.

Responding to this problem, Sony says it will investigate further. "We are studying the report, and will clarify the situation, after having enough information," said Sony's party

Previously, the name was once popular Hotz, in 2007, because at that moment 17 years old, he managed to unlock the iPhone, which was then locked can only operate with the service operator AT & T.

26 Juni 2010

6 Steps Getting rid of virus 'Luna Maya'



Jakarta - A virus is quite irritating to the nickname 'Luna Maya' has spread in Indonesia. This virus displays a message that seems to poke fun at fans of porn videos in Indonesia, with displays Pop Up saying "basis! Bokep brain .."

The virus also caused considerable impacts annoying. For instance, drive CD / DVD ROM will be kept open even though it was closed manually by the user.

Nicknamed 'Luna Maya' given to this virus because one file has a name spreading LunaMaya.exe. The virus is detected as Suspicious_Gen2.LBTU by Norman Security Suite.

Well, here are six steps to evict this virus as submitted by Adi Saputra, antivirus analysts from Vaksincom:

1. Perform cleaning of viruses on the mode "safe mode".
To enter the mode "safe mode", press the F8 key on the keyboard when the computer starts.
On the Windows Advanced Options menu, you can choose the mode "safe mode" or can also mode "safe mode with networking" and "command prompt". In order to more easily select just fashion "safe mode."
Let windows running until the confirmation window pops up use of "safe mode". (See figure 12)
Click the "Yes", to use the mode "safe mode" on the confirmation window.

2. Turn off the active virus in memory.
Use Task Manager replacement tool in this case use CurProcess. Download tools CurrProcess on the following link: http://www.nirsoft.net/utils/cprocess.zip
CurrProcess Run, and then locate the file viruses "Amoumain.exe". Left-click the virus file, then select the "Kill Selected Processes." If a virus file is missing, then close the window CurrProcess.

3. Fix windows registry is already in the modification of the virus with the following steps:

a. Copy this script to use WordPad. Click [Start] à [All Programs] à [Accessoris] à [WordPad].

[Version]
Signature = "$ Chicago $"
Provider = Vaksincom Oyee

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, ShowSuperHidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, SuperHidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, HideFileExt, 0x00010001, 0
HKLM, SOFTWARE \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"

[Del]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableTaskMgr
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ explorer, NoRun

b. Save the file with the name "repair.inf". Use the Save as type option to Text Document in order to avoid mistakes.
c. Right-click the file "repair.inf" then select "Install".

4. Remove virus file "Luna Maya" with the following characteristics:
Have the file type "Application"
Has a file size of "37 kb"
Having a MS Word file icon

Note:
To facilitate the search should use the Search function of Windows by using the filter files *. exe and *. inf and size 37 kb.
Delete virus files which usually have the same modified date.
Be sure to remove the main virus file like: Amoumain.exe, Luna Maya.exe, Love.exe, and nt.bat
Log-off computers, then log in again.

5. For optimal cleaning and prevent re-infection, re-use antivirus software that scans an updated and properly recognize this virus.

6. For USB flash drives or removable already damaged by a virus or format, should use recovery software to recover lost data.
(WSH / WSH)

25 Juni 2010

"Who was the first hacker in the world?"



Hacker terminology emerged in the early 1960s among members of student organizations Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they are struggling with a number of mainframe computers. Said the first time hackers came up with a positive sense to describe a member who has expertise in the field of computers and able to make computer programs better than it has been designed together.

Then in 1983, the term hacker became negative. Because, in that year for the first time the FBI caught the 414s computer criminal groups based in Milwaukee, USA. 414 is their local area code. Group that came to be called hackers are convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators enjoy immunity because TESTIMONIALS, while five other players get probation.

Then in the next development comes another group that mention themselves hackers, but it's not. They are (especially the men) who get the satisfaction of breaking through computer and telephone outsmart (phreaking). True hackers call these people 'crackers' and do not like hanging out with them. True hackers crackers as people looked lazy, irresponsible, and not too smart. Real hackers do not agree to say that with a person through the security has become a hacker.

Hackers meet once every year that is held every mid-July in Las Vegas. A meeting of the world's largest hacker is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.

Hacker has a negative connotation because of misunderstanding of the community will be differences in terms of hackers and crackers. Many people understand that hackerlah resulting in loss of certain parties, such as changing the look of a web site (defacing), insert the virus code and so on. In fact, they are a cracker. Crackerlah using vulnerabilities that have not been repaired by the manufacturer software (bugs) to infiltrate and damage a system. For this reason, hackers usually divided into two groups understood the White Hat Hackers, ie the actual hackers and crackers are often called Black Hat Hackers term.

In 1983 out again by a movie called War Games in which one of his role is played by Matthew Broderick as David Lightman. The movie is about a teenage computer enthusiast who accidentally connected with the secret super computer that controls the U.S. nuclear arsenal.
Then in 1995 came out a movie called Hackers, who told the struggle between the young champion of underground computer with a high-tech companies in through a computer system. In the film, described how young children eventually are able to penetrate security and cripple computer systems company. One of the players is Angelina Jolie's role as Kate Libby aka Acid Burn.
In the same year out of a movie called The Net also played by Sandra Bullock as Angela Bennett. The film tells how the struggle of a computer expert female identity and the information in the real world identity has been changed by someone. With the release of two films, the existence of hackers getting away from the terminology, which first appeared in the 1960s at MIT.

24 Juni 2010

Twitter invaded 'Hacker', 1000 hijacked an Account



F-Secure observe a peculiarity in mikroblogging popular Twitter service. There are 1,000 more accounts that appear to be victims of burglary.

This was stated by Mikko Hypponen Chief Research Officer of the antivirus company F-Secure, the official blog F-Secure is quoted on Tuesday (22/06/2010).

"Over the last 12 hours, there are more than 1,000 Twitter accounts that fall victim to an attack by an unknown method," wrote Mikko.

Symptoms taxable account that this attack is to send a Tweet read 'Hacked by Turkish Hackers'. By Mikko, most of which fall victim was the owner of the account of Israel.

Not yet clear what methods the attackers in this action. But Mikko suspect, there is Phishing attacks for Twitter users in Hebrew.

23 Juni 2010

So the Israel sites Victims Protest Action



Sympathy for the Palestine people increasingly spread to all citizens of the world, including Indonesia. Various methods are used to show antipathy toward Israel, party campaigning and attacks on Palestine. One of them breaking into the site of action of Israel.

on Wednesday (06/02/2010), this morning noted that there is a site in Israel for hacking by Indonesian hackers. Seen from the description written on the web page, hackers who named himself VYCOD it put the photos that show the suffering of the Palestinian people. When opening the site, owned by Michael Heart song titled We Will Not Go Down accompany the action indicated concerns abuser.

Also listed a series of sentences that show concern over the Israeli attacks against Palestine.

White light that blinded the eyes
Gaza burning brightly in the sky tonight
People were running for cover
Without knowing whether they were alive or dead

They came with tanks and aircraft
With a fire that damaged berkobaran
And there's nothing left
Only the sound is heard in the smoky haze

We will not surrender
At night, without a fight
You can burn our mosques, our homes and our schools
But our spirit will never die
We will not surrender
In Gaza tonight

Women and children
Murdered and slaughtered every night
While the leaders of faraway
Arguing about who 'really

But the words were in vain
And the bombs fell down like acid rain
But through the tears and blood and the pain
You can still hear that voice in the midst of thick smoke

If observed, the sentence is a translation of the lyric song We Will Not Go Down is sung to show sympathy for the Palestinian people. At the end of page views, the perpetrators are called on Israel to stop attacks against the Palestinians.

22 Juni 2010

Google Trends is not hacked last week



It turns out that Google Trends is not hacked last week, on Thursday June 17, 2010 yesterday, the phrase "- lol n" appears, while the broad terms of other weird and not one of a kind normally found on Google Trends hottest topic of the list of issues.
In the official response was issued the day Monday, June 21, 2010 Google says that "the term in question" in the Hot Trends list that appears in the list "for several hours after a wave of search activity for the request."
Company to maintain this is not hack in which outsiders gain access to Google Inc. in the network.
"Although we have a filtering mechanism to help prevent inappropriate requests and automatically appear on Google Trends, there are no filters that are 100% accurate. We constantly update and improve our filters in order to provide the best experience for users. "According to the statement.
Google declined to offer specifics about what type of filtration system that checks the signal. A spokesperson said that when the content in question appears on Google Trends, the company is "almost immediately warned by the user and the media."
He said that Google Inc. "continuous improvement" filtration system. "It's really impossible to understand a motive," he added, "but again, Google Trends did exactly what he was doing, which correctly interpreted the increased demand."

21 Juni 2010

Indonesia 80% Site Safe from Hackers'



Indonesia is one country with the largest number of web administrator. This also makes Indonesian sites are considered relatively safe from attacks by hackers.

Said exploitation software & security practitioners, Hanjian to detikINET. "Approximately 80 percent of Indonesian site safe from hacker attacks," he said.

Hanjian believes that because the web administrator of the population in Indonesia is very much. And in fact, he adds, 'working isengnya' web admin is damaging external sites.

"Working the web outside isengnya damage. Well, the logic simpelnya is his duty to maintain the security of their site. More and more web admin in Indonesia, hence more safe sites Indonesia," said Hanjian.

"Because they (the admin web-ed.) Average know each other. So if there is weakness or broken into their site from outside it will help each other," he continued.

Furthermore, the man who is now a web admin from 26 sites in Indonesia, said that compared with other countries, Indonesia's sites tend to be more secure.

"If there are sites of weak security that develop in this case because the system might just understand it," exclaimed the man, who also serves as chairman of the management and security seminars Analisys in Xcode, one of the hacking community in Indonesia.

20 Juni 2010

Invaded 'Turkish Hacker', Twitter Got A lot of Error



Mikroblogging site Twitter could become victims of alleged acts parties calling itself the 'Turkish Hackers'. At the time of the incident, the site is on the rise it has gone through a lot of errors.

Is a computer security and antivirus company F-Secure initially detect anomaly on Twitter. According to Mikko Hypponen, Chief Research Officer at F-Secure, there are around 1000-an account which suddenly raises the message 'Hacked by Turkish Hackers'.

Not just a Re-Tweet (featuring repeated messages from fellow Twitter users-red), the victims appear to deliver messages from the same interface and are not known with certainty. According to Mikko observations, most victims come from Israel.

Well, as quoted from the official statement Twitter, Tuesday (22/06/2010) attacks with increased number of errors on the Twitter service. "We see a high error rate periodically on Twitter.com," said a statement Twitter.

High error rates that occurred on June 21, 2010 local time, more or less at the same time F-Secure started noticing the action 'Hacked by Turkish Hackers' earlier. After several hours of Twitter to report the error rate decreases up to the level of being.

It is unclear whether the observed action of F-Secure directly related to the number of errors on Twitter. Could be they just coincidence. One thing is clear, the attack observed by F-Secure itself seems to have subsided.

19 Juni 2010

Windows 8 leaked to public




Not just out of Windows 7, Microsoft is certainly still continue to innovate mempercanggih newest operating system. Even the Windows OS 8 reportedly slipped later in the year 2012.

If the calendar is not proven and the virtual tribe of Judgement is not present in 2012, Microsoft will be poured newest operating system, Windows 8. Exactly three years after the appearance of Windows 7 this year.

This issue developed after Microsoft's roadmap yanng allegedly managed to spread across the internet. Quoted from Electronista, the roadmap is illustrated in accordance with the rhythm peluncurkan Microsoft products.

For example, to launch Windows Server 2003 and Windows Server 2003 R2, Microsot takes time for two years, from 2003 until 2005. Similarly, when launching Windows Server 2008 and Windows Server 2008 R2.

Therefore, Microsoft deemed it did not take long to be poured back its latest operating system codenamed Windows 8.
But the secret Windows 8 Uncovered:
CALIFORNIA - Microsoft is fire beard, because the specification of Windows 8, which is a continuation of Windows 7, leaked and widely spread on the internet. Worse, the new operating system to disassemble it, is an employee of Microsoft itself.

8 Details about Windows itself starts from Robert Morgan, who wrote in the column profiles on business networking sites Linkedln. Morgan who holds the position of Senior Research and Development, wrote that if he worked in research and development department with high security level for the medium and long-term project.

Neglectful in his profile, wrote Morgan was working on the project plans to create Windows 8 and Windows 9. Within these profiles also written "The kernel architecture of Windows 8 is compatible with 128-bit and Windows 9 are in the planning." Similarly, quoted by PC World.

Yet as known, Windows 7 will be released on October 22, 2009, just supports 32-bit and 64-bit. To support 64-bit itself, Microsoft is using it the first time in Windows XP Professional X64 edition, launched in May 2005 set.

There has been no response from Microsoft about the leaking of the operating system that is still a secret. Morgan who leaked Windows 8 and Windows 9 have deleted the post in the profile, although the trace crime 'can be recorded on the Google search engine.

18 Juni 2010

10 most dangerous viruses



1. Storm Worm
Appeared in 2006, called "Storm Worm" because it spreads via email with the title "230 dead as storm batters Europe". Storm worm is a Trojan horse program. Some versions could make computers become bots. Or commonly used hackers to spam mail over the Internet.

2. Leap-A/Oompa- A
Mac had a concept of security through obscurity sure will not have a virus because of its closed system OS. But in 2006, Leap-A virus or commonly called Oompa-A emerged. Spreads through iChat on the Mac. Having a Mac attack, the virus will search for contacts via iChat and send messages to each contact. The message that contains the corrupted file in the form of JPEG. It's not dangerous, but this suggests that there may be some dangerous virus that attacks the MAC.

3. Sasser and Netsky
Creator German children aged 17 years, Sven Jaschan. Sasser attack Microsoft Windows. Sasser does not spread via email but if one computer connected to the computer that got the virus. This virus makes the computer can not be revoked without a power shutdown. Netsky spreads via email with a 22 Kb file attachments and Windows network. DoS attacks can be made. Sven Jaschan imprisoned not only given probation 1 year 9 months, because of its age is still below 18 years.

4. MyDome (Novarg)
Began attacking dated February 1, 2004, make a backdoor virus on the OS. The first time it began to date a DDoS. Secondly, on the 12th of February, the virus stopped spreading and start creating backdoors. MyDoom spreads via email, in addition to always search on search engines, like Google began to receive millions of search queries and make slow until it crashes. Because MyDoom, U.S. Senator Chuck Schumer proposed the creation Virus National Response Center.

5. SQL Slammer / Sapphire
Appeared in January 2003, spread quickly via the Internet. It was a service U.S. Bank ATMs crash, the collapse of Seattle's 911 service, and Continental Airlines to cancel some flights because of the error checking in and ticketing. Create a loss of more than $ 1 billion before in-pacthed.

6. Nimda
This was also the year 2001, the opposite of the word "admin". Spread very quickly, according to TruSecure CTO Peter Tippett, Nimda only takes 22 minutes to make a Top Ten at the time. His target Internet servers, spread over the Internet. Nimda will create a backdoor into the OS. so an attacker can access to the server and do anything. Nimda also a DDoS.

7. Code Red and Code Red II
Appear summer 2001, attacks Windows 2000 & NT OS. The virus will create a buffer memory is full so spent. The most exciting time at the White House in touch, all the taxable computer virus is going to be automatic access to a web server in the White House at the same time, so make overload, aka DDoS attacks. Microsoft finally releases patchnya time.

8. The Klez
Appeared in 2001, spreads via email, then sent to the replication of the people in your address book. Create a computer can not operate, the antivirus program can be fatal.

9. ILOVEYOU
After the "Melissa", he emerged from the Philippines, his form of worms, a standalone program able to replicate itself. Spreads via email, titled "love letters" from a secret admirer. His original file LOVE-LETTER-FOR-YOU.TXT. vbs. VBS stands for Visual Basic Scripting. Onel de Guzman was the creator of the Philippines.

10. Melissa
Made in 1999 by David L. Smith, basicnya Microsoft Word macros. Spreads via email with the document "Here is That document you asked for, do not show it to anybodey else.". If it opened, the virus will replicate and automatically sent to the top 50 in the address book of an email. Smith was jailed 20 months and fined $ 5,000 and prohibited from accessing the computer without supervision.

16 Juni 2010

30 World's Most Dangerous Site

Be careful in browsing or open certain sites that have not been clear. Because it could contain dangerous viruses that would meugikan us. Below is the world's dirtiest sites, those sites have many various viruses which cause the hp / damage your pc. This is a list of dangerous sites:

1. 17ebook.com
2. aladel.net
3. bpwhamburgorchardpark.org
4. clicnews.com
5. dfwdiesel.net
6. divineenterprises.net
7. fantasticfilms.ru
8. gardensrestaurantandcatering.com
9. ginedis.com
10. gncr.org
11. hdvideoforums.org
12. hihanin.com
13. kingfamilyphotoalbum.com
14. likaraoke.com
15. mactep.org
16. magic4you.nu
17. marbling.pe
18. krnacjalneg.info
19. pronline.ru
20. purplehoodie.com
21. qsng.cn
22. seksburada.net
23. sportsmansclub.net
24. stock888.cn
25. tathli.com
26. teamclouds.com
27. texaswhitetailfever.com
28. wadefamilytree.org
29. xnescat.info
30. yt118.com

just share

15 Juni 2010

Hackers have 114 Thousand 3G iPad Email Owner



A group of hackers managed to get 114 thousand emails iPad owner, by exploiting vulnerabilities in the telecommunications giant AT & T.

Valleywag reported this hijacker managed to get an email that contains a list of email addresses of users of the top iPad, including business leaders in the U.S., politicians and even military officials.

Walleywag publish some names from the list. The list includes the chief executive of the New York Times, Janet Robinson, New York City Mayor Michael Bloomberg and the White House staff chief Rahm Emanuel.

IPad owners are customers of AT & T 3G service that provides mobile connectivity to users touch-screen tablet computer from Apple's.

Valleywag says the hackers called Goatse Security get a number of network users AT & T called the ICC IDS.

In a question, AT & T said that they did have a branching data and apologized to customers affected.

"AT & T has been informed by the businessman on Monday and then on the potential of their iPad IDS ICC," said the AT & T.

"We are still investigating and will inform all customers about the ICC's email address and IDS that may be included in the list," said AT & T.

"At this point, there is no evidence that there are other customer information that has been scattered."

Valleywag says that previous Security Goatse has revealed vulnerabilities in Firefox and Safari browser site.

AT & T email branching is related to the email address of the owner of the iPad at companies such as Goldman Sachs, JP Morgan, and Morgan Stanley Citigorup and staff at the Pentagon, Senate, Justice Department, NASA and the Department of Homeland Security.

14 Juni 2010

Create a file into an error in a few seconds

In doing this I am not responsible if something happened that was not in want. Also in doing this action is strictly prohibited for criminal action.

Only a few seconds all the files will be errors.

First you try to open a command prompt or click Start select Run and typing cmd and OK
Then you are typing at the command prompt as below:

Assoc. Exe =. maxcodegun

or

Assoc. Maxcodegun =. jpg

And what amazing results are not, suddenly all the files. Exe or. Jpg will be errors.

Now we just change the file extension you will get corrupted.

Simple is not just a few seconds all the files into error.

13 Juni 2010

FBI Handle User Data leakage iPad

foto


New York - United States Federal Bureau of Investigation (FBI) investigate the case of leakage of the electronic mail address e-mail alias Apple iPad thousands of users in the operator AT & T. More than 114 thousand people, including government officials who leaked her email address, is the telecom operator's customers.

From these leaks, the FBI saw the potential "threat of Internet crime." AT & T party still refused to comment last week. Defrauding this data only experienced users who signed up iPad 3G wireless Internet services.

Bobolnya iPad user data security systems anticipated for the discovery of the SIM card serial number or the ICC-IDs (Integrated circuit card Identifiers) for the iPad. Inside the numbers are stored user data anyone iPad. From there the hijackers, who calls himself Goatse Security, gaining more than 114 thousand users e-mail address iPad. Apple Inc., manufacturer of iPad, also has not commented on this.

AT & T has apologized and will notify all users who send e-mail it might have been accessible to hackers. Although not effective enough because the hackers just have an e-mail, they know very well the people who receive e-mails they are the users iPad and customers AT & T, which usually receive e-mails from Apple or AT & T about their account.

This is where the opportunities hackers trick users into opening it iPad e-mail that has been planted with malicious software. E-mail address is New York Mayor Michael Bloomberg, including a broken, but he said it did not matter. "It should not be hard to figure out my e-mail address," Bloomberg said, "But, if you send an e-mail and I do not want to read, I do not open it."

12 Juni 2010

Google bans employees Wear Windows



Internet giant Google prohibits all employees using the operating system (OS) Microsoft Windows besutan. This prohibition was issued for security reasons.

Instead, more than 10,000 Google employees are required to switch to Apple's OSX, Linux, and of course Chrome which was launched to challenge Windows.

This step is still associated with the attacks that hit the Google of China late last year. Where at the time, your Gmail account belonging to activists of Human Rights (Human Rights) and 20 important companies in China Successful dibobol hackers. For information, hackers succeeded in piercing because of the weakness in Internet Explorer - Microsoft used the victim's browser.

"We no longer use Windows. It deals with security issues," said one Google employee who is not mentioned by name, quoted from the Telegraph, Wednesday (02/06/2010).

"Many people have switched from Windows to Mac computer, after the action of hacking that hit the Google of China," said another officer, to strengthen his statement.

Google does not play in implementing this policy. So much so, the officials who still want to use Windows, must obtain permission from senior officials in their offices.

11 Juni 2010

Indonesian Hacker Attack Coalition Reply China-Malaysia



No thanks to the action of the coalition Evils virtual defacement of China and Malaysia, Indonesian hackers also directly respond to the attack last night. This time the victim is a Malaysian government website.

From the monitoring detikINET, Tuesday (6/8/2010) at about nine o'clock in the morning, the site is located at the posted http://hoshas.moh.gov.my/oldwebsite/ and http://hoshas.moh.gov.my/ clear red and white flag that flew with the words, DO NOT disturb INDONESIA, HEY Chinese / Malaysian, ur action is STUPIDhttp: / / lampungtengah.go.id.

It seems that cyber action Evils of this country as a response to previous actions, which attacked government sites lampungtengah.go.id. This is very clearly described by the content of messages posted on the Malaysia site.


Hacked BY INDONESIA:


this is my opinion to stupid malaysia

-> We already very patient to Indonesia hackers <-> Do you remember? May 28?. <
-> Indonesia's military invasion of Malaysia News! <-> Today We fought back to lead a Coalition operation! <-> BY: China / Malaysia Hacker Union <-> China and Malaysia, We Will give network security! <-> And please dont ever try to hack malaysia / china website again!

It seems that virtual Evils war drums have been sounded across the state. We'll see whether the coalition virtual Evils China / Malaysia immediately respond to the same thing.

10 Juni 2010

how to speed up slow computer

I see a lot of Windows users always complain "My computer/pc is too slow. How to speed up my pc speed performance?" and they need a new PC. Upgrading the PC is always a viable option for better performance, but here are things that you can do to keep your PC healthy and i am sure this will help you to make your PC faster. But changing pc everytime is a costly affair and hence i have listed below 10 perfect ways to help you improve your computer speed performance. Thus, you will be able to speed up your computer/pc for free.
The last time u installed Windows it worked very smoothly on your first boot right? The boot process was faster, applications were running quickly and smoothly, no errors. Now why does it takes such a long time to boot and takes lot of memory? What can i possibly do to restore my PC that earlier state?

Speed up windows computer The answer is pretty simple. You have to take care of your pc and tweak a bit. Overclocking your PC is an option to try at your own risk which i don’t recommend hence not discussing in this post. You only have to understand why your pc is slowing down and do things to prevent from slowing down.
Here are 10 simple ways to speed your PC:

1. Using an Anti-Virus, Spyware and Adware removal program:

If you use Internet frequently, chances are that you pc is infected by any adware or spyware if you not using a good anti virus/anti-malware program. Most adware’s and spywares open multiple connections to access internet spreading infection all over the web. This may slow down your pc, other harmful viruses might crunch your memory and system resources mostly slowing down startup process. Therefore,

Use a good antivirus, adware, spyware removal Software.
Make sure you UPDATE it regularly.
Enable the auto update mode for better security.
Run regular scans (weekly scheduled scanning recommended).
2. Defragmenting Hard drives:

The files when moved or created on your PC are stored into small fragments randomly on your disk drive. When you open those files it takes time to gather all those chunks and put them back together to form that single file. When you defragment your drive all those scattered fragments are arranged properly on the drive thus loading application bit faster. There is a Disk Defragmenter utility in windows,

Open My Computer > Right click on the disk drive you want to defragment > Select Properties > Under Tools tab click Defragment Now. But i recommend Power Defragmenter a small free utility by sysinternals which is faster and with various options.

3. Clean Registry:

Windows registry is a database of information of all the files, folders and the windows configuration. This database grows as you use windows, can also become erroneous. Thus, it becomes necessary to clean and repair registry errors regularly. Use CCleaner, a tiny Freeware to scan and fix registry issues.

4. Delete Temporary, Junk and Obsolete files/Clear cache:

Clean all your drives for free space, i personally recommend keep atleast 20% of your drive space free. Also, you have to clear the windows TEMP files, the web browsers temporary files, caches files, etc. All web browsers has that option.CCleaner will be a good choice for the same, it will analyze and clean all unwanted internet files, Windows Explorer files and system files.

5. Check Disk for errors:

Scan your disk for errors regularly. There may be some lost fragments or links which may lead to error in application. Run Scandisk once a week to keep things running smoothly. the error checking utility in windows will scan and attempt to recover bad sectors. Open My Computer > Right click the drive > Properties > Tools > click Check Now Button. Else simply type chkdsk /r at the command prompt.

6. Remove Startup items:

Removing unwanted startup programs will speedup the windows boot process and your desktop will be ready quickly. some programs like Limewire or MSN messenger take time to load at startup, you can remove those and run them when needed.to remove Startup items: Start > Run > type msconfig > press OK. Now in the System Configuration Utility uncheck the unwanted programs (better Disable All).

7. Remove unnecessary Programs:

Remove those programs which you don’t use anymore. This will free disk space and even help windows perform better. Also, remove the windows unwanted components like Indexing services & Outlook Express from the Add/Remove windows programs.

8. Keep PC updated:

Look for regular updates, Enable Windows Updates, Updates includes major bugfixes which can be helpful. Look for new Service packs for better hardware compatibility. Update all device drivers, anti-virus programs and other applications. Hardware Manufactures keep updating their device drivers for better and smooth functioning. I have written earlier on a Free Software To Update Windows Device Drivers do read that.

9. Remove unwanted visual effects:

The animated windows and fading menus can slow down your pc unknowingly. You can remove those fading effects, Use windows classic style theme, remove the heavy graphic wallpaper(none), You can even lower the color quality( to medium 16-Bit) and lower the screen resolution. Lower the screen resolution, better the performance.

10.Use Lightweight programs:

Replace all those resource consuming programs and look for better alternatives, especially for those who have RAM less then 512 and an old PIII machine.

use Lightweight antivirus programs like Avira...the best i found, NOD32, AVG instead of Norton Antivirus.

This will really help you improve performance and helped me speed up my pc/computer.Try these out to improve your computer speed and performance.

Hey guys...if you have any additional tips to improve slow pc performance, then just mention it below in comments section.

Enjoy HaCkInG.....

9 Juni 2010

Stealing other people flash data

Stealing data-Owned Data User flashdisk

Flash is a portable storage medium that is now more widely used by computer users in Indonesia. In addition to the cheap price, the greater its capacity even with the physical size of the growing mini from generation to generation;)
Well, usually nich, people often will store sensitive data in flash. And not infrequently, someone save PASSWORD-account accounts on a text file that is stored in a flash.
Thus targeting your targets? way quite easily. Tools and materials you need to prepare are:
ThumbsuCK.exe - for free downloads on the member's area kategory http://spyrozone.net Tools & Utility
After you download it, copy ThumbSUCK.exe into a hidden directory. For example, you place it on the Local Drive D: \. Make a directory with SUPER HIDDEN attribute to an unsuspecting victim. Follow the following guidelines:

1. Make a new directory in D: \ or wherever you like. Give up your name.

In this example I give the name gudangkorban. Copy ThumbSUCK.exe into

directory and click 2X to menjalankannnya.

2. Click Start - Run then type cmd to call the Windows Command Processor

3. Now it's time to make such a super hidden directory. Use only

attrib command with the format lokasifolder attrib + s + h. Because the directory name

gudangkorban had made is located on drive D: \ then type:

attrib d: \ gudangkorban + s + h

then press ENTER.

've Done .. now try your own plug your flash. Your data that resides in flash are copied to the silent mode by ThumbSUCK.exe gudangkorban into a directory in a folder with a label in accordance with the volume of flash.
Because the directory given gudangkorban super hidden attribute, then remove the checkmark in the options terlebihdahulu Hide Protected Operating System Files (Recomended) and check the Show Hidden Files and Folders in Folder Options (Tools -> Folder Options in Windows Explorer).
To disable this application, use the Windows TaskManager (CTRL-ALT-DELETE) or just use your favorite TaskManager.
What if planted on a public computer? or grown in the lab-lab campus? Hmm .. beramain-play with a little Registry, you can make this application run automatically when Windows startup; p hehehe .. of course you can harvest personal data of others ^ _ ^

8 Juni 2010

Hide files in images

Did you ever have confidential files you wish to send to others? There are so many file protection program that can be found on the Internet. But there are so many ways to penetrate the protection of these programs.

I'll share some tips for you to hide your confidential files belonging to an image file. Previously confirm that you have installed on your computer WinRar

1. Settinglah your windows to display the file extension. Open the Control Panel and click on Folder Options 2X. Go to the View tab and then remove the checkmark on the option "Hide extensions for Known file types"



2. Prepare your confidential files (file extension is up), for example, has video_rahasia.avi name and an image file (*. bmp, *. jpg, * gif) for example with the name pemandangan.jpg. Keep two files in a directory the same.

3. Right click on the file and select menu video_rahasia.avi [Add to "video_rahasia.rar"]. Will create a new file with the name video_rahasia.rar



4. Now open the Notepad application (Start -> Run type in Notepad) and type the following script:

@ Echo off
ren video_rahasia.rar video_rahasia.avi.rar
copy / b pemandangan.jpg + video_rahasia.avi.rar hasil.jpg
del video_rahasia.avi
del pemandangan.jpg
del video_rahasia.avi.rar
del hide.bat

Remember! Customize the names of the files on the script above with the name of your file (unless hide.bat). Note also the following lines:



ren video_rahasia.rar video_rahasia.avi.rar



Writing format: Ren namafileanda.rar namafileanda.ekstensisebelumnya.rar

So, if such a file you previously were at RAR rahasia.exe and after a rahasia.rar, the writing is:



ren raahsia.rar rahasia.exe.rar



Note also the file name hasil.jpg. Change hasil.jpg become hasil.ekstensi_file_gambar_anda. So, for example picture files that you use to hide a secret file is pemandangan.gif later, change into hasil.gif hasil.jpg



Well, keep this file in the same location as your files earlier. Click [File] [Save] and then on the File name type in a form hide.bat While in the Save as type select 'All files'. Click [Save] afterwards.





5. Close all windows programs that tebuka. Now open the folder where you store all the files. Double click on the file hide.bat. Wait until the flash of shadow windows command processor to appear. If successful, all the files in that folder will be lost is replaced with a new file named hasil.jpg

Try hasil.jpg you open the file. Glance will not make any difference with yours pemandangan.jpg file unless the file sizes are getting bigger. You can still open the file with the Picture Editor or your favorite Image Viewer. There are no signs that there are actually a great secret in it hehehe .. ;)



Why, then where is my secret file? Relax, do not panic! Right click on the file hasil.jpg then choose [Open With] -> [Choose Program ..]. Pick WinRar then click [OK].



Well, your confidential files will appear in front of you. You can extract these files as you to extract the rar files in general.



Here is the very core of our hideout. Try to think of it, in fair condition, is there any person who opens an image file with the application file compressor? Did it ever cross your mind will open landscape images using WinRar? Of course not it?? Obviously people will typically open a file on the image with imaging applications or image viewer. Now, with this psychological advantage then at least your files will be safely hidden;) Now you can submit a confidential file to someone who you mean by quiet. Certainly do not forget to tell your colleagues about how to open it;)

7 Juni 2010

Work on THE VISITORS / intruder (shutdown)

Become an intruder is fun. But everything will be so annoying when we are in a position of victim / the admin. This is only one alternative to menjahili the intruder. We will disable the computer remotely;) No need to bother using your favorite remote program, simply use the default windows. On how to detect the intruder, read the previous article.


Open your Windows Command Processor. Click Start, -> Run then type: Cmd
At the command prompt, type: shutdown-i and press Enter.
The command will call the Remote Shutdown dialog box. Note screenshoot follows:




Click the Add button to enter the IP Address or name of the target computer. You can choose the action, Shutdown, Log Off or Restart. In a column for the Display warning you can determine how long the countdown is not displayed before the computer shutdown / log off / restart. At the option of planned, there is an automated message that you can choose. In the Comment column, you can write your message to the intruder. Whether teasing or .. study of up to you .. I think you are more good about the dancer-teased hehehe ... ;)

Click OK afterwards. Approximately on the target computer will appear like this:



Hohoho ... not fun? Eh? Why? Oh, you are the intruder? do not want the computer to which you switched off in the way above? Relax, I have some tips .. ;)



When you see a warning dialog box that your computer shutdown akn immediately, as soon as possible open the Notepad or Microsoft Word application. Type the following magic words: I WANT TO LIVE AGAIN THE YEAR 1000!
Hehehe .. Gradually yach? emang have those words? Yes no study of .. What type aja dech, it's up to you But, do not leave blank. Do not press the Save button! ;)

When "execution time" shows the number 00:00:00, windows will try to close applications that are still open. Now, the application Notepad / Microsoft Word you open the line will ask for confirmation from you if you want to save your document. Do not select anything, just let the dialog box wondering tu; p

A few moments later will be the End Program dialog box appears, click on a cross that is on the top right corner or select cancel. Dialog box that appears different, more or less like this:




Well, you will find your computer to stay alive, healthy and upright. hehehe ... ;)



That's all the way? There nich a more "formal" ^ _ ^

1. Click START -> Run

2. Quick as a flash, type shutdown-a

Those orders were orders to do Abort on shutdown.



Then what will be the administrator? Of course this condition will not be silenced. Do not let the intruder smiles own. You're the admin who should be smiling:) Give the second attack! Do not wear your favorite radio and remote software, do not need ngeluarin ultimate weapon for intruder like this. Repeat this step, the shutdown-i, but do not give the check to warn the option Users Of the action and also kosongi Planned option. Do not give any messages and the intruder's computer will be shutdown immediately without confirmation;)



Among ... and Happy shutting down! ^ _ ^

source: http://zonabaru.blogspot.com/2010/05/mengerjai-sang-pengunjungpenyusup.html

6 Juni 2010

tips for the use mozilla firefox browser so fast

Create an on pake mozilla and slow connections,,
There are tips for fast connections let

1. Open Mozilla.

2. Typing in the addresses bar "about: config" (without the servant).

3. Scroll down your mouse and search for "network.http.max-connections", double click it and input the value "64".

4. Search for "network.http.max-connections-per-server", double click it and input the value "21".

5. Search 'network.http.max-persistent-connections-per-server ", double click it and input the value" 8 ".

6. Doube click on the "network.http.pipelining" to "true".

7. Search for "network.http.pipelining.maxrequests", double click and the input value "100".

8. Double click on the "network.http.proxy.pipelining" becomes "true."

9. The last step, right click anywhere, select: New>> integrar>> then write "nglayout.initialpaint.delay" (without quotation marks ". Then input the value" 0 ".


Close your Mozilla, and then open it again and compare the speed before you make this setting. How did it go?
If still equal aja mean you're wrong settings and try try again!

5 Juni 2010

Optimizing windows speed using windows registry editor - Get rid of unwanted programs on startup

How to optimize the Windows performance by removing unwanted programs from startup using windows registry. Applicable to Windows XP, Vista, Windows 2000, windows 98 and windows server.
I will start hacking tips with a very useful and easy to do job. Most of us face this problem of computer slowing down; windows operating system takes ages to load when started, windows explorer hangs up and also how to find out whether your computer is infected.

Follow these steps:
1.Start and click on run in case of windows XP, Server, windows 98, and 2000 but in vista type directly in search box



2. Type Regedit in the run box to open registry editor



3. Go to file menu and click on export to create a back up of registry, save it on your drive other than your default windows directory.




Find out the current programs which are starting up with windows
After opening Registry editor click on HKEY_LOCAL_MACHINE

Software\
Microsoft\
Windows\
Current Version\
Run
You will see something like this on right hand pane in your registry editor







Now it’s time to get rid of the programs those slow down your operating system and possible may be a Trojan horse hiding in your hard disk.



Right click on any program to delete the entry, which you don’t want to be loaded during startup; personally I would only keep anti virus program entries.



Now you can repeat the same process with HKEY_LOCAL_USER entries and keep only Cftmon.exe for your computer sound to be working



After deleting the unwanted program registry entries, restart the system and feel the difference in speed. If you are confused about which entries to be deleted from registry editor or want to know whether it’s a Trojan or useful program, you can write to me at rhadianzzz@rocketmail.com