Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Friday, May 8, 2009

NASA Warns of Super Solar Storm 2012


Nasa is warning the world about a major event that is going to take place during the much noted and spoken of 2012 calendar year. A year that was an important date of Earth's history. 2012 is also a prophecy predicted of a enormous global event seen by the ancient-Mayans civilization as well as others. Is this super solar storm what the Mayans invisioned?

What NASA is saying is a super solar storm can possibly effect life on Earth in such away it may even wipe it out life as we know it. A throwback atleast of a hundred years or worse.

Making daily life completely unfamiliar to us. The entire globe's electric power grid could be knocked out causing us to tumble back to existence of living off the land without electricity or satelite capabilities.

Advanced civilizations that rely on technology could become obsolete things of the past. Michio Kaku a well known astro-physicist speaks in depth about the devistation this event may cause.

HERE IS THE FOOTAGE


Readmore...

Friday, April 3, 2009

7 Steps To Exterminate The Conficker.DV Virus

Conficker.DV Virus using the distribution method that is different from preceding. With its sophisticated, the virus tried to access the network using a slit windows 'Default Share'(ADMIN $\system32) with the administrator password.


In addition 'Conficker.DV' also create a file on removable media such as flash, hard drive and card reader to save the file hidden on the root drive.

While the action the same as preceding, that is trying to exploitate MS08-067 or Windows security cleft , Windows Server Service or SVCHOST.exe. Many users are infected because they are not activate the Automatic Updates feature and does not do windows patch MS08-067.

If you are like this, see 7 short steps of the virus analyst from Adi Saputra Vaksincom to eradicate the virus' Conficker.DV '

1. Disconnect the computer that will be cleared from the network / internet.
2. Turn off system restore (Windows XP / Vista).
3. Turn off the active virus process in the services. Use the removal tool from Norman to clean the active virus. If you do not have, can be downloaded at the site norman.
4. Delete the fake service svchost.exe on registry. You can search manually in the registry.
5. Delete Task Schedule which was created by the virus. (C: \ WINDOWS \ Tasks)
6. Remove the registry string which was created by the virus. To facilitate the registry , you can use the script below:


[Version]
Signature="$Chicago$"
Provider=Vaksincom Oyee

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced,
Hidden, 0x00000001,1
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced,
SuperHidden, 0x00000001,1
HKLM,
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL,
CheckedValue, 0x00000001,1
HKLM, SYSTEM\CurrentControlSet\Services\BITS, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\ERSvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wscsvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wuauserv, Start, 0x00000002,2

[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, dl
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Applets, dl
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, TcpNumConnections



Use the notepad, then save with the name 'repair.inf', then 'Save As Type' to 'All Files' so that the error does not occur. Repair.inf run with the right click, then select install.

Meanwhile, for the active file on startup, you can disable it through 'msconfig' atau can manually delete the string: 'HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run


7. For cleaning the virus W32/Conficker.DV optimally and prevent re-infection, you should use and update anti-virus that is able to detect this virus with both your computer and the patch with the official patch from Microsoft to prevent re-infection.

Readmore...

Thursday, March 19, 2009

Be careful! Your Yahoo Messenger is seized by people

DO NOT dally if you want your Yahoo "taken by" other people. Techniques that are raiding accounts popularity at this time is through phishing is assigned through Yahoo Messenger.

Phishing is basically the message, but essentially ordinary court to the victim to click a specific site address. Most often is the message that your friend's new upload photos. Some of the addresses at this time mostly used, among other picz.com www.holiday-or summer-picz.com. However, the carrier can make spam a new address at any time and pass it on.

Addresses had been prepared to entice the victim so that the voluntary and without realizing the wealth in this case following your Yahoo password. Never enter your Yahoo Email and Password for your YM account you will be immediately known.

Yahoo Account once you know, technically, a lot of dangerous things that can be done without you. Such as sending phishing, SPAM, email scandal to change the data owner's account. Especially if you have access to valuable account in your YM as administrator mailinglist with a large number of members, products, accounts and other Yahoo.



A number of sites or traps forgery is easily identified and it is not new. Firefox browser even has features to provide a warning for sites with forgery red icon and the police. Unfortunately, Internet Explorer and Safari do not have this feature. So, the only way avoid exposure suit should not enter your Yahoo password to other sites.

Social engineering

All the misguided people at risk to go to snare it. Can be inaccurate because the suspect visited the site the site is owned by Yahoo. However, often the main reason is because upon the recipient thinks the message is sent that you have contacts in Yahoo Messenger.

Of course, you believe that your friend may not harm you with the rope to your phishing site. So if you receive a message like the above, do not riot prior to your friend. This is social engineering which used actors.

The problem, YM message is apparently not sent by your friend, but because Yahoo Account has been known and used to send messages to all contacts lead to click a link that opens a web page that asks for Yahoo Mail and password.

The only way to remove this "spam" is immediately ask your friends to replace Yahoo Password. Without change, spam messages will be sent to hold everywhere. It is also important to check carefully whether the data support the account in accordance with still Yahoo himself. If it is still appropriate, may be Yahoo account is still safe to use.

But if you was-was, to change your Yahoo account with the new and do not forget to complete your Yahoo login with the "Sign in Seal" and always look at the Yahoo address each time you enter a username and password.

Legal but underhanded

Did your Yahoo account takeovers was legal, perpetrators are legitimate companies that are domiciled in Panama. This means the legal owner of a Yahoo account is trapped by phishing can not sue.

Apparently TP Ltd, a company which is the mastermind of all this, using the underhand social weaknesses of the Internet users. The author describes the site Terms and Conditions which states that our Yahoo account allows companies to use your account to send ads via either email or through instant messenger.

That is not less interesting, game companies have online internet popular in Indonesia with hundreds of thousands of members using the service users appeared to TP Ltd. The company is using the services to distribute game ad

source: tekno.kompas.com


Readmore...

Tuesday, March 17, 2009

Tips Choosing a Smartphone or PDA Phone

Various manufacturers smartphone and PDA phone-race competition to market their products. There is work with service providers to create exclusive network to be able to chat and send e-mail easily. There are also embed a variety of events such as 3.5G technology that can access data on the Internet or send e-mail with high speed. Some manufacturers embed the Global Positioning Satellite, or GPS integrated with maps in their products so that people can not be lost on any of them are.

Basically, smartphone or PDA phone is a communication tool or a mobile phone equipped with a digital organizer. This device can also function as a data organizer, e-mail client, web browser, music player, movie player, digital camera, GPS, edit documents, and other functions.




What difference PDA phone and Smartphone?

In fact both of them almost similar. PDA phone, which is short for Personal Digital Assistant Phone is a development of the PDA can also be used as a phone. PDA itself was originally created as a mini computer that functions as a digital organizer and easy to carry everywhere. However, in further development, the function is added in the PDA phone, so known by the name of PDA phone.

On the development of the smartphone is a mobile phone which is then added features and other facilities so that a smart phone and called a smartphone. If compared, almost no differences between the PDA phone and smartphone.

Tips Choosing a PDA phone or Smartphone

Here are some tips and advice before you decide to change your mobile phone with a smartphone or PDA phone.



# Mobile Network

If you often travel to foreign countries and to the outside of the city, choose the smartphone with GSM network and CDMA is not. Because overseas, you can buy prepaid cards to install on your smartphone. You can also use the network of the roaming service provider. But if you're more in the country, you can use alternative networks such as CDMA.


# Operating System (Operating System)

Available at this time the various operating systems (operating system) for the smartphone. Some of the Symbian, Windows Mobile, Android, Linux, Palm OS, and BlackBerry. Each has its own advantages and special functions. Check carefully with the functions which are the most suitable and most often you use. Almost all of the operating system can perform basic functions such as phone, e-mail, web, and SMS / MMS. However, there are some that are specific, such as the BlackBerry is capable of connecting to the server e-mail and chat servers belonging to specific BlackBerry. If you often use products like Microsoft Windows and Microsoft Office, you can choose the device with the Windows Mobile operating system so that you are more used to using it.

# Speed Data (Download Speed)

Speed data can also be special for you who often take the data on the Internet or send data via e-mail. Some smartphone offers 3G data speeds up to HSDPA (High Speed Downlink Package Access) or 3.5G is 7 times the speed reaches the speed 3G. In the CDMA network is also known as EV-DO. If you subscribe to packet-based time, the high-speed data, the cheaper your bill balance because the download time much faster. Speed data from the lowest to the highest, namely (in the GSM network): GPRS, EDGE, 3G, 3.5G (HSDPA).

# WiFi function

If you are in the area that provide free hotspot, then consider buying a smartphone that has WiFi facilities. With this facility, you can connect to the Internet without burdening your credit bills. This function is not recommended for smartphone has been given the mobile network that offers broadband Internet speed, such as 3.5G and EV-DO.

# QWERTY keypad

Some smartphone is equipped with a QWERTY keypad the keypad layout is similar to the order of letters letters on the keyboard your computer or laptop. This facility is easier to type on the user's smartphone rather than using a numeric keypad or a number. If you type often, you use a suitable QWERTY keypad. But if you simply call, read your e-mail and browsing, numeric keypad or the numbers are still appropriate for you.

# Connectivity (Connectivity)

Make sure you can move data on the smartphone to the media or other devices easily. For example, you have to take a picture or portrait that is quite a lot in your smartphone, and want to move to a computer or laptop, or print to your printer. Of course you need the link to the other device such as a data cable, USB or via Bluetooth. Therefore, make sure that one or more facilities to connect other devices available in the smartphone that you will buy.

# Memory

Check if the amount of internal memory that is available to make your data needs. If you feel less, check whether the smartphone also has a slot for external memory to accommodate data-your data.

# Display (Display)

If the document you often do in your smartphone, then choose the screen size (display) is great. A larger screen make it easier for you and comfortable in the process and do your document. However, should remember is that the size of the big screen will make the device more baterry needed. In addition, also consider the depth of color that is displayed. The greater color depth, then the displayed image will be more beautiful.

# Applications

You can also check applications (software) are included in the smartphone. If you frequently prepare documents, whether the application has been in office (office suite), such as word processing, spreadsheet and other applications. Or if you're happy listening to music or watching movies, whether it is available the application of good entertainment in it.

# Connection Company (Corporate Connection)

If you are assigned to provide smartphone to employees in your company consider the smartphone can be integrated with the system in your company. BlackBerry is used for many employees of company because of the compatibility to integrate with e-mail system and server in the company.

# After Sales Service

Make sure you buy a smartphone through a distributor that has after-sales service is clear. Because of the many features of a smartphone, of course you need after sales support as a good warranty, product training, software updates and improvements.

# Ensure More

Make sure that before deciding to buy products with the smartphone to ask questions following the self:

* Will comfortably held device?
* Is the display screen is clearly visible?
* What is the price the device is still reasonable for me?
* What is the key and the keypad easy to use?

Smartphone or PDA phone is not cheap goods. Therefore, when you want to buy the device, you must choose carefully as you need. If your primary need to listen to music, watching movies, or play games, then you should just buy the HP with the function of entertainment. However, if you frequently use the Internet, working with various documents, schedule and require the organizer, then you should choose the product smartphone or PDA phone. A smartphone can do many things to ease your life.


Readmore...

Saturday, February 14, 2009

Microsoft bounty for worm creator

A reward of $250,000 (£172,000) has been offered by Microsoft to find who is behind the Downadup/Conficker virus.

Since it started circulating in October 2008 the Conficker worm has managed to infect millions of computers worldwide.

The software giant is offering the cash reward because it views the Conficker worm as a criminal attack.

"People who write this malware have to be held accountable," said George Stathakopulos, of Microsoft's Trustworthy Computing Group.

He told BBC News the company was "not prepared to sit back and let this kind of activity go unchecked".

"Our message is very clear - whoever wrote this caused significant pain to our customers and we are sending a message that we will do everything we can to help with your arrest," said Mr Stathakopulos.



Arbor Networks said as many as 12 million computers could be affected globally by Conficker/Downadup since it began prowling the web looking for vulnerable machines to infect in October.

Malicious payload

The Conficker worm is a self-replicating program that takes advantage of networks or computers that have not kept up to date with Windows security patches.

It can infect machines via a net connection or by hiding on USB memory drives used to ferry data from one computer to another. Once in a computer it digs deep, setting up defences that make it hard to extract.
USB drives, BBC
The worm can also spread via USB flash drives.

The worm slithers through networks by guessing usernames and passwords. Security specialists recommend hardening passwords by mixing in numbers, punctuation marks and capital letters.

The virus reports in to its creators for updates by visiting a web domain. It generates the name of the domain itself using a complicated code which security firms have cracked to track the growth of the worm and block its progress.

Malware such as Downadup can be triggered to steal data or turn control of infected computers over to malicious hackers which pool them into larger armies of so-called botnets.

These networks of compromised machines can be used to send spam, as dead drops for stolen or pirated data and to launch attacks on other machines.

Although Downadup is widespread its creators have yet to activate its payload to steal data or launch other attacks.

It has caused costly headaches for network administrators dealing with users locked out of their accounts when the worm correctly guesses a password.

While Microsoft says it does not know the intention of the worm's creator, it wants to ensure it does not wreak any more havoc.

Experts say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch - also known as KB958644.

Global response

Microsoft has also partnered with security companies, domain name providers, academia, internet companies such as AOL and others on a co-ordinated global response to the worm.
Discarded computers, AP
Millions of computers have been hit by Conficker

Also included is the US Department of Justice and the Department of Homeland Security.

"The best way to defeat potential botnets like Conficker/Downadup is by the security and Domain Name System communities working together," said Greg Rattray, chief internet security adviser at the Internet Corporation for Assigned Names and Numbers (Icann).

"Icann represents a community that's all about co-ordinating those kinds of efforts to keep the internet globally secure and stable."

Sasser worm

In 2003 Microsoft created its reward programme with $5m (£3.4m) in funding to help law enforcement agencies bring computer virus and worm authors to justice.

This reward for help in tracking the creators of Downadup is the first time in four years that the company has put up some cash in response to a worm outbreak.
Clock, BBC
Microsoft hopes its bounty has started the countdown to finding its creator

"We have not seen this type of worm or one of its class since 2004," said Mr Stathakopulos.

In 2005 Microsoft paid out $250,000 (£171,000) to two individuals who helped identify the creator of the notorious Sasser worm. The author was arrested and sentenced by the German authorities.

Rewards of $250,000 were offered over three other major computer worm threats known as Blaster, MyDoom and Sobig worms.

Those perpetrators have never been caught.
Readmore...

Friday, February 13, 2009

Telco's initiatives help build local skills

It's no surprise that Siemens, the German industry giant, has been around a long time, but did you know it has been doing business in Indonesia since 1855?

I learned about this during a recent visit to the head office of Nokia Siemens Networks Indonesia in Menara Mulia, Jakarta.

Back in the 19th century, among other things, Siemens brought the first key telegraph equipment to the island of Java, installed electricity generators in Batavia and installed the lighting in the Sultan's palace in Yogyakarta.




As you know, in mid 2006, Nokia bought the carrier services arm of Siemens AG. The resulting 50-50 company was called Nokia Siemens Networks (NSN). The new company has nothing to do with the mobile devices business, which is under Nokia Mobile. Rather, NSN is focused on providing products and services for fixed and wireless networks. In fact, according to NSN's release, Frost & Sullivan, a global business research and consulting firm, recognized NSN as the Telecom Equipment Vendor of the Year in Indonesia for 2008.



What enabled this company to lead the delivery of telecom products and services in Indonesia in just one and a half years after the merger? First, according to Arjun Trivedi, head of subregion Indonesia, NSN had offices in all 33 provinces plus 20 other cities across the country. The closeness to the customers facilitates the contact between the engineers and the customers and expedites their services. Currently, NSN employs 1,100 permanent employees and 2,400 contract workers. Half of the total 3,500 employees work in Jakarta. "A very substantial number of these people are Indonesians," Arjun told me in our conversation.

Another reason for the achievement is of course the wide range of technologies that NSN brings to Indonesia, which Arjun claimed to be the largest in the country. It includes access technologies such as ADSL, HSDPA, HSPA, HSPA Evo, LTE and even WiMAX.

The broad portfolio allows the company to provide services such as applications development, network optimization and, of course, procurement to local telecom operators such as Telkom, Telkomsel, Indosat, Excelcomindo, 3 and Axis. Interestingly, I learned that Internet service providers such as CBN and Biznet are also among NSN's customers.

I was also surprised to find out that Jakarta serves 12 countries in the Asia-Pacific region, including India, South Korea, Australia and New Zealand. The R&D center in this city focuses on supporting Intelligent Networks (IN).

An Intelligent Network, in essence, includes the servers and systems for prepaid applications. "We are developing prepaid applications here in Jakarta," said Arjun. These are very complex applications, since, as the term "prepaid" indicates, the operators have to be able to track the usage of the "pulses" by each customer in real time to make sure that every second of call is paid for.

In this connection, the most interesting facility that NSN has built in Indonesia is the newly inaugurated test bed. The core of this test bed was actually inherited from Siemens, but it was still very small when it was transferred to NSN. Located on the ground floor of Menara Mulia, it contains a fully working GSM/UMTS network complete with the BTS and switch. This test bed is interconnected to three other facilities in the world - Helsinki, Munich and Singapore. "Any GSM operator in Indonesia can bring their equipment here for testing purposes," Arjun explained. By testing the equipment or software in the test bed instead of the real network, operators can avoid the risk of wreaking havoc with their networks, which are bound to make their customers very unhappy.

Another feature of the test bed is that it can also be used as a training center by university students wishing to learn about the latest in network technology.

In fact, one of such training sessions happened to be going on when I toured the facility. Local developers can also come and test the applications they are working on to verify that these applications will work in a live network and will not bring it to its knees.

Like other global telecom vendors in Indonesia, NSN also works with leading local universities - ITB (Bandung), ITS (Surabaya) and UI (Jakarta). What distinguishes NSN is perhaps the attention given to women in technology.

In addition to conferring Woman in Technology Award, the company has also sent several female university graduates to Finland to learn about research and development in the telecom industry.

NSN may not be a familiar name in Indonesia - perhaps because it is still a fairly young company. Yet our young engineers must take advantage of the test bed, the R&D center, the various scholarships and all the training or internship programs that global telecom companies such as NSN offer. It is the only way we can build our local competence and talent pool in this industry.

Readmore...

pusat script mesin uang