Rabu, 25 Maret 2009

hiding ip adress


Hide something that is easy but also difficult. It is very easy to live because you hide your IP address but you also difficult because many hackers also finally discovered and caught, so do not use it for evil but to use the security self-ber when the Internet.

At the time we connect to the Internet, an IP address will be provided by the ISP and the ISP will also record the user's IP number, when and to whom given. This is what we always make the eyes-matai.

So what do most of the hacker to hide himself? By using the proxy (a computer broker "brokers" between our IP and the target computer).

For example, when you browse to a site via a proxy server xxx, then the server sites that you visit will only record the IP address of the proxy server xxx, and not the IP address of the original you.

Where is safe? Safe because the original IP we will not be known by anyone and also a proxy server xxx not register and access our behavior in the internet which means our original IP directly removed from the proxy server xxx.

This service is often called the anonymouse proxy sites and service providers is that I like is anonymouse.org, the view that simple and easy to use. In fact there are many more service providers this website so stay aja searchable on Google.

At the site of this service you will see a column that is provided to enter a destination address browsing. And the result is different from the original IP address for you. Kan easy?

If you want more secure again, you can combine some of the proxy server but it will make you a connection will be slower.

Selasa, 24 Maret 2009

the differences between internet, intranet, ekstranet

Internet is a network of networks

Intranet is a computer-based network protocol, TCP / IP as the Internet is used only internally in the company, office, and even internet cafes (WARNET) can Categorize the Intranet. Intranet between each other can communicate with each other through an Internet backbone that provides long-distance communication. Akan but actually does not need an Intranet connection to the outside Internet to function properly. Intranet use all the protocol TCP / IP and its application so that we have "private" Internet.

If a body of business / business / institutions expose some of the internal network to the outside community, in this case called Ekstranet. Indeed, all the contents are not usually remove the intranet to the public, to make the intranet into Ekstranet. For example, we are buying software, books etc. from an e-store, then usually we can access the intranet part of the store. Agency business / company can block access to their intranet through a firewall router and laying. Firewall is a software / hardware that someone set the access into the intranet. Protection is done through a variety of parameters if the network IP address, port number etc.. If you enable the firewall in the access can be controlled so that we can only access the Intranet from any part of the company, which was then known as the extranet.

Differences between virus, trojan, backdoor, malware, spyware

Differences between virus, trojan, backdoor, malware, spyware
some of my friends asking the differences between them above..
virusComputer virus is computer program which can duplicate its body and spread. it's spread insert the computer program or another document. Virus computer can be analogyst as a biologist virus which spread and inserting their body into our cell. virus computer can make our data in document broken, make the user of the computer fell disturbed, or doesnt taking any effect.

Commonly computer virus brake our software and can't directly brake our hardware (especially in operating system. like operation windows (Windows 95, Windows 98/98SE, Windows NT, Windows NT Server, Windows 2000, Windows 2000 Server, Windows 2003, Windows 2003 Server, Windows XP Home Edition, Windows XP Professional, Windows XP Servicepack 1, Windows XP Servicepack 2, windows vista) and also GNU/Linux. negative effect of computer virus is when the virus duplicate its body, its decrease the resource of the computer (like memory and CPU time) almost 95% Virus is base on windows operation system. Sisanya 2% attacking Linux/GNU

(and Unix as a source from linux tentunya), 1% atacking Mac especially Mac OS 9, Mac OS X(tiger, Leopard). 2% attacking another sistem operation like FreeBSD, OS/2 IBM, and Sun operating System)

Virus attacks can be prevented by others or by using antivirus software. This type of software can also detect and remove computer viruses, the virus database as long as the computer is owned by the antivirus software already contains the code to remove the virus.

An example is virusnya Worm, Trojan, etc.. Example of a reliable anti-virus and prevent virus is Kaspersky, AVG, AntiVir, PCMAV, Norton, Norman, and McAfee.

Worm

Worm a kind of virus who cannot infect another program. Its make their clone and infect another computer (usually using a network) but it not connecting with another program; but the worm can change or brake the file or program.


Trojan

Trojan is a duplicate or a replica of the virus. Trojan virus entered the program because of the nature of the unwanted and work by itself on a computer. Nature is mengkontrol trojan computer automatically. For example, the computer entered trojan email. Trojan entered in Rats (remote access trojans) where a computer controlled by a particular program, even some trojan work to open the computer that can be entered by computer and diaccess from jauh.Norton, Norman, and McAfee.

Backdoor:

Backdoor or "back door", in the security computer system, refers to mechanisms that can be used to access the system, application, or network, apart from the general mechanism is used (through the logon authentication process or other). Is also called as the back door.


Backdoor initially created by computer programmers as the mechanism that allows them to obtain special access to them in the program, often used to justify and improve the code in the program that they make when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmers to create a login process in 1983 when it obtained Turing Award), other than the login program is used in common UNIX operating system using the C programming language, so that he can access the UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect himself from pendeteksian and disposal of the system, even if the user successfully find it, because the backdoor makes himself again (do rekompilasi own).

Some software developers to add a backdoor in the program for the purpose of buatannya damage (or the purpose of suspicious). For example, a backdoor can be inserted in the code in an online shopping site (e-commerce) to allow the developer to obtain information about transactions that occur between buyers and sellers, including credit cards.


The term now used by the backdoor hacker-hacker to refer to a mechanism that allows the system can access peretas back a system that has been attacked before without having to repeat the process of exploitation of the system or network, as it did the first time. Generally, once a network has been attacked by using the exploit (to a Handling / Vulnerability), an attacker will cover all jejaknya in the system concerned with modifying the file system record (log) or delete it, and then menginstalasikan a backdoor in the form of a software or to add a special user account that has rights to access the network administrator or system administrator.

If the owner and the network or system to realize that the system has been attacked, and then close all Handling is known in the system (but does not detect the existence of the backdoor installed), still before the attacker will be able to access the system, discovered by the owner without the network, especially after registering himself as a legitimate user in the system or network. Have the right as the network administrator, he can do things that can damage the system or remove the data. In cases like the above, a commonly used way is to make re-installation of the system or network, or with the restoration of backup / backup that is still clean from the backdoor. Without having to repeat the previous process of exploitation of the system or network, as it did the first time. Generally, once a network has been attacked by using the exploit (to a Handling / Vulnerability), an attacker will cover all jejaknya in the system concerned with modifying the file system record (log) or delete it, and then menginstalasikan a backdoor in the form of a software or to add a special user account that has rights to access the network administrator or system administrator.

There are some devices that can be used to menginstalasikan backdoor, as well as several Trojan horse, but is popular netcat, which can be used in the operating system Windows or UNIX.

Malware :

"Malware" is a computer program that was created with the purpose and objective search for software weaknesses. Malware is generally created for a break or damage the software or operating system. An example of malware is a Virus, Worm, Wabbit, Keylogger, Browser Hijacker, Trojan Horse, Spyware, Backdoor, Dialer, Exploit, and rootkit.

Spyware:

Spyware is software that collects and sending information about computer users without the user knows that. The information that can not unduly harmful patterns such as berkomputer, especially berinternet, until someone is dangerous, such as credit card numbers, PIN for electronic banking (e-banking) and an account password.


Information on the pattern berinternet, already mentioned, is not unduly dangerous. Sites visited, information was sought, chat in the chat room will be the eyes by the matai-spyware. Furthermore, the information is used to display ads that are usually the form of a pop-up window. Yesterday was related to someone berinternet habits. For example, often search for information about digital cameras. A pop-up window that appears will show, for example, sites that deal in digital camera. Adware is the term for which such spyware. The distribution is similar to spyware Trojan. For example, flashget. When used flashget not diregister, flashget act as spyware. Try just connect themselves to the internet, run the flashget not diregister, computer cuekin some time, certainly the internet explorer a window appears that displays an ad site.

To anticipate many virus on the computer, make sure your computer is always protected with the antivirus up to date ..

Minggu, 08 Maret 2009

disconnect modem


do you hate your friend?? or maybe You just played with him..

hmm.. do you have his IP adress.. so what should you do??

i'll tell you the way how to disconnect our foe modem..

first download from

http://www.ziddu.com/download/3094152/RocketV1_0.exe.html

and just write his IP adress on Target ip.. then SEND PACKET..

Rabu, 04 Maret 2009

how to see an asterix keys / password asterix...



how to see an asterix keys...

u ever seen the asterix keys before.. or a password that using a point or a stars..
like this

sometimes someone after writting a password doesnt erase the cookie or the list..

if you see that..
what would you do??

you want to erase that password!!

wait!!!

why we dont we try to see it..


let me teach u by using a software to see that password..
this name is a snadboy revelation..

first download it from
http://www.snadboy.com/

then install it..
and use it..

get the circle on software into the asterix password


Selasa, 03 Maret 2009

keylogger












do u want to know what the people do in their computer?
Record or shot their desktop.,
or are u a newbie hacker? Just like me..hahaha
This the easiest method how record what the user of computers do..

i will teach u how download and using a keylogger..

This is ardamax keylogger..
using It has more advantage than another keylogger..
¤ its record everything they do in that computer
¤ it is easy to use..
¤ you can report the record to the email or your computer (just like the trojan do)
¤ you can take a shoot from the user desktop.


first install its..
And then u see a symbol on system tray.. Open it.. And insert the registration key that i will give on the last of this session..

Second
set ur email,ftp, or ip to send that record into yours

third
set the password of that keylogger.. And set to hide it on everything(start up, tray, windows).. So only u who can open this keylog

this is the place where u can download it and this is the registration key

http://www.ardamax.com/downloads/setup_akl.exe

Kimberley Ronald
RGA3Y3A-M3D88-T3HU5-T28TM-G47AS-SFTD7-624JC

make a fake email....


are u ever get the email that u never know before..
Or maybe u ever heard that someone
have lied by other people to get his attention..

in this sheet… let me teach u how to make a fake email..

first
let us want a help from our "uncle google"..

second
write this on the search.. "inurl:XcCDONTS.asp"

third
write into who and from who u want sending that email.. write the body...and don't forget to write the subject..(like u sending an email)

if that failed.. you can download the software from

http://www.esnips.com/doc/4577e167-6036-4dff-b6ab-f95a4ba65e66/MiSoSKiaNs-Fake-Mail


i hope u won't using this program to adverse another people