Sunday, December 20, 2009

Social Security Cyber Criminal

On the crisis world and difficulty to pretend the live better, more intelligent people using their ability to the criminal work, like reported on the science daily news said. Hacker spread of new spam campaign using false emails made to look like messages from Social Security Administration is capable of stealing Social Security numbers and downloading malware onto victims’ home computers.

Many nature disaster that happened on this world give an idea for cyber criminal to prey on victims concerns over money, promising Social Security payouts and tax breaks to victims that sign in to the criminals fake Social Security Webpages.

 They are spread a spam message to the victim directly and tell users that there are errors with their social security statement then asks them to link to false pages made to look like the Social Security Administration Web Site. These false pages ask users to enter their social security numbers before prompting them to download their fake statement.

 Actually they download a virus that can stealing every personal information available on that personal computers. This virus will get all of your personal information and infected your personal computer with serious malware that enables them to steal information and raid your bank and other accounts on your computers.

 We remind that computer users that no legitimate company or agency would ever ask users to update or review records via email, but instead would request they do so only through that company’s own Web site. E-mails requesting account updates should not be considered legitimate.

 Others Related Articles:
  1. Hiding Password From Hacker
  2. Certified Ethical Hacker


Monday, November 16, 2009

Bill Gates Donations to The World

"In June 2008, Bill Gates 52-year-old the President of Microsoft made announcement will leave a more valuable treasure US $ 59 billion for the purpose of virtue in his will.

The money would be placed in the Foundation Bill and Melinda Gates to fund health research and medical science, is also intended for education around the world.

"We want to give something to people who can contribute to the overall good of all." He said.

Bill Gates plans to pensions 2 or 3 years, the greatest contribution of U.S. $ 500 million to the foundation The foundation's Global Funds through the Bill & Melinda Gates Foundation.

The contribution was not cash but to be repaid in 5 years, despite being a big donation, the Foundation Funds The Golbal they still lack the funds, I also still lack the funds :)

The Global Fund was responsible for 1/5 international funding for all programs on HIV & AIDS. So far, the Global Funds has issued a humanitarian fund for 5.4 billion dollars, mostly for poor countries like Nigeria, but there was no clarity about the use of the funds they provide. There are playing time, especially when the going worse donate to underdevelopment country, usually the corrruption still uncontrolled, he he

Other articles:

Sunday, November 15, 2009

Indonesian Microsoft Precident Resign

Tony Chen, President Director of Indonesian Microsot officially announced his resignation from the giants company's IT . Good luck for you Mr Tony Chen, we’ll be waiting for your next venture.

"This is a very tough decision for me. Microsoft is a company that embraced the values of the employees who also have a great spirit, and loved my life working for Microsoft for 7 years. However, after consideration within the next few months, I was ready to launch a new development in my career, and make the difficult decision to leave Microsoft to pursue challenges and different responsibilities, " quoted from the Legal.

Tony Chen's success in Microsoft Indonesia is seen very clearly with a more close relationship between the government of Indonesia with Microsoft and also support Microsoft's IT infrastructure in the various institutions of government. And we know the level of piracy Microsoft products in Indonesia is extremely high, but thanks to Tony Chen, this issue can gradually be overcome.

Not only with the government, Microsoft was also able to approach Indonesian cafe entrepreneurs with packages Microsoft Windows is less expensive to use the Internet cafe business, and also some educational institutions are also supported by Microsoft. Microsoft also seems able to attract big players in the arena of web Indonesia to use Microsoft products such as Compass (ePaper Silverlight), Kaskus, and many more.

Other related articles:

Friday, July 31, 2009

Implementing, Configuring, Managing, and Troubleshooting Local Group Policy

Group Policy exists at local computers, servers, and at the network level. “Local Computer Policy” is the set of Group Policy settings for a local computer. A “Group Policy Object” is any single set of settings. A Group Policy Object exists as a document.

Group Policy is one of the essences of the Windows 2003 and XP lifestyle. A group policy controls who can do what. Traditionally, group policy allows directory objects to perform certain actions. At domain-level security, group policy can act on objects such as servers, organizational sites, and so forth. However, at the desktop level, group policy acts pretty much exclusively on users and groups. Some modifications to group policy, such as modifications to account and audit polices, affect all users; other modifications to group policy affect only certain users depending on whether the user is a member of the proper group. (We call the latter sort of group policy “group-oriented group policy.”)

One way to understand group-oriented group policy is to note that, when you create a new group, there is no Properties button on the group. You can’t just right-click on the group and start assigning powers and restrictions. Instead, you must modify group-oriented group policy objects, choosing for each policy whether or not to enable that policy for a given group.

Combined with Active Directory in Windows 2000 Server, group policy is a powerful tool toward creating an integrated, hierarchical policy-based security infrastructure for an enterprise. For our limited Windows 2000 Professional-based discussion, Active Directory will not come into play. However, a limited version of Group Policy implemented at a local level in Windows 2000 Professional allows for a fair amount of control over security issues.

There’s a lot of meat to Group Policy. We won’t be able to cover every single policy, or even policy type, available to you in Group Policy Editor. However, we will take an in-depth look at those parts of Group Policy that concern security. Microsoft is emphasizing the security-related portions of Group Policy in the test.

Thursday, July 2, 2009

Free Base Program of Microsoft

As the latest news about the microsoft company lately, I feel sorry to this company, the news said that Microsoft facing on crisis right now. If this is right, I think Microsoft shoul be careful on creating or developing their office like Ms. Office 2007 and Ms. Office 2010 that will release in the near future.

I think better if Microsoft develop a new base program similar windows but everyone can use free like Linux, but the application just can use this base program and should pay for of course. Microsoft can develop just email that base on this base program, or video player and many others, or people can develop their program by their self to this base program.

The concept just provide the base program and people can use it, microsoft on this matter just provide a service that people will modificate or course on many how to, but they must pay for this. Microsoft may will not as the biggest income on this matter but can give others the same benefit and we are all can survive. This is just my oppinion on avoid of income monopoly.

Thursday, June 25, 2009

Office 2007 Convert To Office 2003

We are mostly more familiar with office 2003 than office 2007. Office have menu that very different looking compare with office 2003, so we feel difficult to customize file and using this new office, Word, Excel, PowerPoint and others. Although we actually usually have use those available function but if look on the new arrangement we feel very strange and sometime make frustration for learn more detail.

Don’t to worry about this new looking that make we more confused, we can change this looking into the last office that we usually used such as on office 2003. You can change this view with UbitMenu to convert form looking of office 2007, than you will get the same view as office 2003 and no frustrate or too long for learn new office and easily for getting toolbar or menubar that is usually used.

Unfortunately this UbitMenu is not free yet, and sell using license. This UbitMenu is sell with € 10 (~$ 13.50) per company, and available for each basic language, and will add other cost if you have many user in your office, per user will charge for € 0.65 (~$ 0.88).

This application is very small and can be installed in a few second, and will not change the available menu as on this new office. Using this UbitMenu just adding new ribbon menu, and will not disturb to the office itself.

If you that will make you more hard because of adding for new expense, so don’t worry again, Microsoft just launce of new office version, Office 2010. What is available on this new version, I will discussed later, and hope will helpful for our you that don’t familiar with office 2007.

Just my advise, learn for new type more better than we buy for just can use by old version, because all will change to new version, and you still use old version looking. So others will say to you for ancient people type.

Sunday, June 21, 2009

What is Dinamic Link

Dynamic linking Library (DLL) is a kind of small program collection, this program is stored in the computer as file with extension .dll. This program is then can be called by other big program to run their application that communicate with specific devise such as printer, scanner, photo etc. Many other application using a dll file, Dll file that support to specific device operation called as device driver.

Why some application using this dll file, because for certain code dll file can be use by many application or many device so that don’t need to write again the same code. For this reason using dll file will more efficient memory, and using this dll file will not loaded into RAM memory together with the main program, so RAM memory will less to use.

DLL file is often given a “.dll” file name suffix. During using this file that is linked with the main program on the execution this dll file then will compile with the main program. The set of such file (or DLL0 is somewhat comparable to the library routine provided with programming language such as C and C++.

Wednesday, June 17, 2009

Check 100 Url Result in Just one Click

When you check some website with certain keyword using your browser, you always get just 10 data of every page and may be you want to check your website availability on the web server and want to know in what position now. Of course there is a certain tool to check this but I this is not simple because you must go to their site and then type your url address on their website tools.

You can change the visibility of your Google toolbar through http://www.google.co.id directly to change this view. Then see on the right side there is “advance search” click this link and you can change the result search to 100 url address. On this tool you can also set language result and file format, and if just search on the certain domain you can fill this column bar by your domain.

As an example I want to search with a keyword “Novel Best Seller” using Indonesian Language with 100 url result then I can see on where position of my Novel The K located. And then I see my “Novel the K” using keyword Novel Best Seller still on the first position.

You can check on the link below what is the position now by click the link below:

http://www.google.com/search?hl=en&as_q=Novel+Best+Seller&as_epq=&as_oq=&as_eq=&num=100&lr=lang_id&as_filetype=&ft=i&as_sitesearch=&as_qdr=all&as_rights=&as_occt=any&cr=&as_nlo=&as_nhi=&safe=images

Thursday, May 7, 2009

Keys For General Navigating on PDF

Keys for general navigating on PDF File are use as follows:

Result

Windows/UNIX Action

Mac OS Action

Move focus to menus (Windows, UNIX); expand first menu item (UNIX)

F10

Control+F2

Move focus to toolbar in browser and application

Shift+F8

Shift+F8

Move to next open document (when focus is on document pane)

Ctrl+F6

Command+F6

Move to previous open document (when focus is on document pane)

Ctrl+Shift+F6

Command+Shift+F6

Close current document

Ctrl+F4

Command+F4

Close all open documents

Not available

Command+Option+W

Move focus to next comment, link, or form field in the document pane

Tab

Tab

Move focus to document pane

F5

F5

Move focus to previous comment, link, or form field in the document pane

Shift+Tab

Shift+Tab

Activate selected tool, item (such as a movie clip or bookmark), or command

Spacebar or Enter

Spacebar or Return

Open context menu

Shift+F10

Control+click

Close context menu

F10

Esc

Return to Hand tool or Select tool

Esc

Esc

Move focus to next tab in a tabbed dialog box

Ctrl+Tab

Not available

Move to next search result and highlight it in the document

F3

F3

Search previous document (with Search results displaying multiple files)

Alt+Shift+Left Arrow (Windows only)

Command+Shift+Left Arrow

Search next document (with Search results displaying multiple files)

Alt+Shift+Right Arrow (Windows only)

Command+Shift+Right Arrow

Select text (with Select tool selected)

Shift+arrow keys

Shift+arrow keys

Select next word or deselect previous word (with Select tool selected)

Shift+Ctrl+Right Arrow or Left Arrow

Not available

Wednesday, May 6, 2009

Keys for navigating a PDF

Key for navigating of PDF file on Mac OS, Windows or Unix:

Result

Windows/UNIX Action

Mac OS Action

Previous screen

Page Up or Shift+Enter

Page Up or Shift+Return

Next screen

Page Down or Enter

Page Down or Return

First page

Home or Shift+Ctrl+Page Up or Shift+Ctrl+Up Arrow

Home or Shift+Command+Up Arrow

Last page

End or Shift+Ctrl+Page Down or Shift+Ctrl+Down Arrow

End or Shift+Command+Down Arrow

Previous page

Left Arrow or Ctrl+Page Up

Left Arrow or Command+Page Up

Next page

Right Arrow or Ctrl+Page Down

Right Arrow or Command+Page Down

Previous open document

Ctrl+F6 (UNIX)

Command+F6

Next open document

Shift+Ctrl+F6 (UNIX)

Shift+Command+F6

Scroll up

Up Arrow

Up Arrow

Scroll down

Down Arrow

Down Arrow

Scroll (when Hand tool is selected)

Spacebar

Spacebar

Zoom in

Ctrl+equal sign

Command+equal sign

Zoom out

Ctrl+hyphen

Command+hyphen

Keys for Working Wiith Comments of PDF

To enable single-key shortcuts, select the Use Single-Key Accelerators To Access Tools option in General preferences.

Result

Windows/UNIX Action

Mac OS Action

Sticky Note tool

S

S

Text Edits tool

E

E

Stamp tool

K

K

Current highlighting tool

U

U

Cycle through highlighting tools: Highlighter, Underline Text, Cross Out Text

Shift+U

Shift+U

Arrow tool

D

D

Cloud tool

Q (Windows only)

Q

Text Box tool

X

X

Attach file as comment

J

J

Cycle through attach tools: Attach File, Record Audio Comment

Shift+J

Shift+J

Move focus to comment

Tab

Tab

Move focus to next comment

Shift+Tab

Shift+Tab

Open pop-up note for comment that has focus

Enter

Return

Keys for Selecting Tools of PDF

To enable single-key shortcuts, open the Preferences dialog box, and under General, select the Use Single-Key Accelerators To Access Tools option.

Tool

Windows/UNIX action

Mac OS action

Hand tool

H

H

Temporarily select Hand tool

Spacebar

Spacebar

Select tool

V

V

Snapshot tool

G

G

Marquee Zoom tool

Z

Z

Temporarily select Dynamic Zoom tool (when Marquee Zoom tool is selected)

Shift

Shift

Temporarily zoom out (when Marquee Zoom tool is selected)

Ctrl

Option

Temporarily select Zoom In tool

Ctrl+spacebar

Command+spacebar

Select Object tool

R

R

Object Data tool

O

O

Article tool

A

A

Crop tool

C

C

Link tool

L

L

Text Field tool

F (Windows only)

F

Cycle through forms tools: Text Field, Check Box, Radio Button, List Box, Combo Box, Button, Digital Signature, Barcode

Shift+F (Windows only)

Shift+F

3D tool

M

M

Cycle through Multimedia tools: Flash, Video

Shift+M

Shift+M

TouchUp Text tool

T

T

Cycle through TouchUp tools: TouchUp Text, TouchUp Reading Order, TouchUp Object

Shift+T

Shift+T

Measuring tool

B

B

Tuesday, April 21, 2009

Make Computer Working Properly

Computer is divided into two main parts, the first part is hardware, circuit electronic components that combine and can make an everything work as the command received, from one part can send the command to every unit on the computer. The second part is software that contains of command program to ask the component can work as the function, this program also can arrange other program to work. The program that is used to make certain hardware working called as Driver.

 

The complex system on the computer can create a problem on their work and difficult to analyze. The problem itself can come from the hardware itself or software on the computer. So the source of the problem sometime can't be detect using software that available on the computer, for this reasons sometime we ask to experience people to repair the problem. Computer with broken hardware sometime can't detect a broken software because they can't work as usual, even can't be turn on.

 

Currently available tools or software that is used detect or check the function of every hardware and software on your computer. Are they all have worked properly? For this purpose, you can use certain software to scan your computer, or even you can use free scan software.

Thursday, April 9, 2009

Using System Monitor

Part of administering your network includes monitoring the health of your computers. In order for your network to operate efficiently, you need to make sure your computers' performance is good enough to handle the load placed on them by the network. By monitoring the performance of your computers, you can see how the load placed on them affects your computers' resources. You can monitor resource usage to see when upgrades are required. You can also create test environments to see the effects of changes to the network.

One of the tools to aid you in this is System Monitor. System Monitor replaces the Performance Monitor used in Windows NT. System Monitor allows you to collect information about your hardware's performance and network utilization. It also gives you the ability to view this data in many different ways. System Monitor is a snap-in to the Performance console, and is installed automatically with the Performance console. The Performance console is a Microsoft Management Console (MMC), accessed through the Administrative Tools program group.

System Monitor can be used to measure different aspects of a computer's performance. It can be used on your own computer or other computers on the network. System Monitor can collect data for memory usage, processor utilization, network activity, and more. This data can be displayed as a graph, histogram, or report. System Monitor can perform many tasks. It can collect real-time data on different aspects of performance and allow you to view this information. This data can also be saved or printed for viewing later. See Figure 8-18 for an example of System Monitor in the Performance console. The example shows processor utilization. The System Monitor is comprised of three basic areas: the graph area, legend, and the value bar.

System Monitor displaying processor utilization


The data you can collect in System Monitor is extensive. There are two basic types of items to collect data on: objects and counters. An object is a component of the system such as memory, processor, or hard disk. Performance data is collected from components on your computer. As a component performs different tasks, performance data can be collected about those tasks. An object contains data measuring a component's tasks. Generally, the object is named after the component it is measuring. Counters are the specific data of an object to be measured. Objects can contain many different counters. Objects can also have multiple instances. If there are multiple objects in a computer, then the objects are distinguished by instances. An example would be a computer with multiple processors. You would use instances to differentiate between the objects for each processor. An example of a counter is the counter Available Bytes from the Memory object. See Table 8-1 for a listing of the most commonly used objects.

Tuesday, March 24, 2009

Certified Ethical Hacker

This is the training for hacker candidate that will know or should be known if you want be a hacker. The material itself will be mastery the how to fools or paralyses the computer system. Hacking materials are about Reconnaissance; Scanning ; Gaining Access ; Maintaining Access till Clearing Tracks.

Persons that better have this knowledge like as:
  • IT Security Officers
  • IT Security Auditors
  • IT Security Professionals
  • Site Administrators
  • Everyone who want to know network security system
The material contains as follows:

1. Introduction to Ethical Hacking
2. Hacking Laws
3. Footprinting
4. Google Hacking
5. Scanning
6. Enumeration
7. System Hacking
8. Trojans and Backdoors
9. Viruses and Worms
10. Sniffers
11. Social Engineering
12. Phishing
13. Hacking Email Accounts
14. Denial-of-Service
15. Session Hijacking
16. Hacking Web Servers
17. Web Application Vulnerabilities
18. Web-Based Password Cracking Techniques
19. SQL Injection
20. Hacking Wireless Networks
21. Physical Security
22. Linux Hacking
23. Evading IDS, Firewalls and Detecting Honey Pots
24. Buffer Overflows
25. Cryptography
26. Penetration Testing
27. Covert Hacking
28. Writing Virus Codes
29. Assembly Language Tutorial
30. Exploit Writing
31. Smashing the Stack for Fun and Profit
32. Windows Based Buffer Overflow Exploit Writing
33. Reverse Engineering
34. MAC OS X Hacking
35. Hacking Routers, cable Modems and Firewalls
36. Hacking Mobile Phones, PDA and Handheld Devices
37. Bluetooth Hacking
38. VoIP Hacking
39. RFID Hacking
40. Spamming
41. Hacking USB Devices
42. Hacking Database Servers
43. Cyber Warfare- Hacking, Al-Qaida and Terrorism
44. Internet Content Filtering Techniques
45. Privacy on the Internet
46. Securing Laptop Computers
47. Spying Technologies
48. Corporate Espionage- Hacking Using Insiders
49. Creating Security Policies
50. Software Piracy and Warez
51. Hacking and Cheating Online Games
52. Hacking RSS and Atom
53. Hacking Web Browsers (Firefox, IE)
54. Proxy Server Technologies
55. Data Loss Prevention
56. Hacking Global Positioning System (GPS)
57. Computer Forensics and Incident Handling
58. Credit Card Frauds
59. How to Steal Passwords
60. Firewall Technologies
61. Threats and Countermeasures
62. Case Studies
63. Botnets
64. Economic Espionage
65. Patch Management
66. Security Convergence
67. Identifying the Terrorist

Wednesday, March 4, 2009

Change Recovery Policy

To change the recovery policy for the local computer

  1. Click Start, click Run, type mmc, and then click OK.
  2. On the File menu, click Add/Remove Snap-in, and then click Add.
  3. Under Add Standalone Snap-in, click Group Policy, and then click Add.
  4. Under Group Policy Object, make sure that Local Computer is displayed, click Finish
  5. Click Close, and then click OK.
  6. In Local Computer Policy, click Public Key Policies.

Location:

    • Local Computer Policy

o  Computer Configuration

o        Windows Settings

o        Security Settings

o        Public Key Policies

  1. In the console tree, right-click Encrypted Data Recovery Agents, and then do one of the following:
    • To designate a user as an additional recovery agent using the Add Recovery Agent wizard, click Add.
    • To request a new file recovery certificate using the Certificate Request wizard, click Create. To complete this procedure, you must have the appropriate permissions to request the certificate and the certification authority (CA) must be configured to issue this type of certificate.
    • To delete this EFS policy and every recovery agent, click Delete Policy. If you select this option, users cannot encrypt files on this computer.

Attention:

  • Before changing the recovery policy in any way, you should first back up the recovery keys to a floppy disk.

Notes

  • You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure.
  • Usually, the computer issues a default self-signed certificate that designates the initial Administrator account as the default recovery agent. However, if the user who first logs on after installation creates a second account by using the Create New User Wizard, then the second account becomes the default recovery agent.
  • If the default recovery agent's certificate is deleted without another recovery agent specified in the policy, the computer has an empty recovery policy. An empty recovery policy means that a recovery agent does not exist. This turns EFS off, so users cannot encrypt files on this computer.
  • In a domain, a default recovery policy is implemented for the domain when the first domain controller is set up. The domain administrator is issued the self-signed certificate, which designates the domain administrator as the recovery agent. To change the default recovery policy for a domain, log on to the first domain controller as an administrator.
  • To make changes to the File Recovery certificate, right-click the certificate and then clicking Properties. For example, you can use this to give the certificate a friendly name and enter a text description.