Copyright By www.surfhealthytips.blogspot.com. Diberdayakan oleh Blogger.

Popular Posts Today

Safety Tips Protect Accounts YM & up from Piracy

Written By RajaBlog on Rabu, 09 Maret 2011 | 06.28


Artist Jajang C. Noer missed. Yahoo Messenger (YM) and up his burglarized by unknown persons. Not only that, a number of colleagues Jajang had asked for money by the perpetrator. How do I avoid this?

According to antivirus and computer security analyst from PT Vaksincom, Alfons Tanujaya, there are a few things to note about the security of private account. Especially relevant ownership password or passwords.



Alfons added, if the user account it difficult to remember passwords, it would require a special application as a reminder. There is a password reminder program that can be downloaded for free from Windows sebabai alternative solution to this problem.

"We just need to know the password reminder that.'ll Stay in the copy-paste it for example for yahoo, twitter, mail server, hotspot, internet banking and others," he added.

Not only that, Alfons also reminded the public to make an email account with their own domain. According to him, free email accounts like Yahoo, Gmail and others at risk enough piracy.

"In addition, change passwords regularly and properly. Do not cuman periodically, but note the surroundings as well as change the password or pin number," he concluded.

Previously, artists Jajang C. Noor, wife of the late Tim Christensen, Damayanti Noor YM his account hijacked. Mode used by the actors is to pretend as the owner of the account and ask for money to a number of colleagues in the accounts. Actors admitted difficulties and asked to transfer money immediately.
06.28 | 0 komentar | Read More

'Diet' Instant with Slimpic


Sometimes someone will look fat when photographed. It may be that at the time of the shooting was finished eating a lot or a camera angle that is not profitable.

Fortunately, with digital camera technology, the resulting images can be easily manipulated. As long as they are not for the purpose of deception, manipulation is actually more or less legitimate.

Well, for the modification of body weight did not need any sophisticated software. A web service called Slimpic.com can be used to 'instant diet'.

Here are the steps:


1. Visit the site Slimpic.com
2. Click the 'Slim your Pics' or directly visit Slimpic.com / Slim
3. Select the photo you want dilangsingkan, can upload from your computer or take from the album on Facebook
4. After the photos uploaded, click Next
5. Select areas of the face or body of people who want to 'dilangsingkan'
6. Select the weight you want deducted (in addition to reducing, can also be added.) Maximum weight is 10 kg modification.
7. See the results, if you're satisfied click Finish
8. If completed, the picture can be saved (downloaded to the computer) and also included in the album on Facebook


Good luck!
06.27 | 0 komentar | Read More

3 How to Clean the Virus 'eaters Notebook'


Stuxnet Virus, or also known as Winsta, devouring all the vacant land on the hard drive until it is full. According to Alfons Tanujaya, antivirus analysts from Vaksincom, to ITGazine, Friday (07/30/2010), Indonesia is a country with the second largest number of victims Stuxnet in the world after Iran.

The virus initially spread from various porn sites, pirated programs and content 'gray' other was quite disturbing. Here are the steps eradicate the virus, such as antivirus Vaksincom spoken by the analyst Adi Saputra:

1. Using Dr. Web CureIt

Adi suggested the victim Winsta aka Stuxnet it to download the virus removal software. Removal Tools called Dr.Web CureIt it can be downloaded from the site FreeDrWeb.com

2. Registry Fix

Later, Adi suggested improvements to the modified Windows regitri by the virus. How, first of all, copy the script below into Wordpad files.

[Version]
Signature = "$ Chicago $"
Provider = Vaksincom Oyee
[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, ShowSuperHidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, SuperHidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, HideFileExt, 0x00010001, 0
HKLM, SOFTWARE \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"

[Del]
HKLM, SYSTEM \ CurrentControlSet \ Services \ MRxCls
HKLM, SYSTEM \ CurrentControlSet \ Services \ MRxNet
HKLM, SYSTEM \ ControlSet001 \ Services \ MRxCls
HKLM, SYSTEM \ ControlSet002 \ Services \ MRxNet
HKLM, SYSTEM \ CurrentControlSet \ Services \ Enum \ Root \ LEGACY_MRXClS
HKLM, SYSTEM \ CurrentControlSet \ Services \ Enum \ Root \ LEGACY_MRXNET
HKLM, SYSTEM \ ControlSet001 \ Services \ Enum \ Root \ LEGACY_MRXClS
HKLM, SYSTEM \ ControlSet002 \ Services \ Enum \ Root \ LEGACY_MRXNET

Then, save the file with the name 'repair.inf'. Use the option to Save as type Text Document to avoid mistakes. Then, right-click the file 'repair.inf', select 'Install' and restart the computer.

"Clean up temporary files, this is for to prevent the rest of the trojan that tries to be active again. Use tools such as the ATF Cleaner or use the Windows feature of the Disk Clean-Up," wrote Adi.

3. Emergency Solutions

In addition, here is the script that can be used in emergencies to prevent Winsta not re-infect. Save the following script with the name Winsta.bat (file type: Text)

@ Echo off
del / f c: \ windows \ system32 \ winsta.exe
brake rd c: \ windows \ system32 \ winsta.exe
md c: \ windows \ system32 \ winsta.exe
del / f c: \ windows \ system32 \ drivers \ mrxnet.sys
brake rd c: \ windows \ system32 \ drivers \ mrxnet.sys
md c: \ windows \ system32 \ drivers \ mrxnet.sys
del / f c: \ windows \ system32 \ drivers \ mrxcls.sys
brake rd c: \ windows \ system32 \ drivers \ mrxcls.sys
md c: \ windows \ system32 \ drivers \ mrxcls.sys
attrib + r + h + s c: \ windows \ system32 \ winsta.exe
attrib + r + h + sc: \ windows \ system32 \ drivers \ mrxnet.sys
attrib + r + h + sc: \ windows \ system32 \ drivers \ mrxnet.sys

When finished, double click the file Winsta.bat generated. For optimal cleaning and prevent re-infection, re-scan using updated antivirus and recognize this virus very well.
06.24 | 0 komentar | Read More

3 Leading Site for Finding Text Movies


The presence of virus W32/VBWorm.BEUA or better known as viruses that exploit security holes shortcut is quite disturbing. For, although labeled local virus, he not only take advantage of user negligence. But has 'first class' with a break through Windows security holes.

Consider the 8 practical steps to kick the virus is able to change the folder that is in the USB flash disk into the shortcut, according to Jauhar Adang Taufik, an analyst with Vaksincom:

1. Disable 'System Restore' for a while during the cleaning process.

2. Decide who will clean your computer from the network.

3. Turn off the virus active in memory by using the tools 'Ice Sword'. Once the tools are installed, select the file that has the icon 'Microsoft Visual Basic Project' and click 'Terminate Process'. Please download these tools at http://icesword.en.softonic.com/

4. Delete the registry that has been created by the virus by:
-. Click the [Start]
-. Click [Run]
-. Type Regedit.exe, and click the [OK]
-. In the Registry Editor application, browse the key [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]
-. Then delete the key that has the data [C: \ Documents and Settings \% username%].

5. Disable the autoplay / autorun Windows. Copy the script below in notepad and then save it as repair.inf, install the files in the following manner: Right-click repair.inf -> INSTALL


[Version]

Signature = "$ Chicago $"

Provider = Vaksincom


[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del
[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer NoDriveTypeAutoRun, 0x000000ff, 255
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer NoDriveTypeAutoRun, 0x000000ff, 255

6. Delete Files parent and duplicate files are created by the virus included in the flash disk. To expedite the search process, you can use the 'Search'. Before conducting the search should show all hidden files by changing the Folder Options settings.

Do not let an error occurs when deleting a master file and duplicate files that have been created by the virus. Then delete the master files that have virus characteristics:

-. Icon 'Microsoft Visual Basic Project'.
-. File Size 128 KB (for other variants will have varying sizes).
-. Ekstesi file '. EXE' or '. SCR'.
-. File type 'Application' or 'Screen Saver'.

Then delete the duplicate shortcut files that have the characteristics:

>. Folder Icon or icons
>. Extension. LNK
>. File Type 'Shortcut'
>. 1 KB file size

Delete the file. DLL (example: ert.dll) and Autorun.inf file on flash disk or a shared folder. Meanwhile, to avoid the virus is active again, delete the master file that has an EXE or SCR extensions first and then remove Shortcut file (. LNK).

7. Show re-folders have been hidden by the virus. To speed up the process, please download the tools Unhide Files and Folders in http://www.flashshare.com/bfu/download.html.

Once installed, select the directory [C: \ Documents and Settings] and folders that exist on the flash disk by moving into fields that are already available. In the [Attributes] clear all the options, then click the [Change Attributes].

8. Install security patches 'Microsoft Windows Shell shortcut handling remote code execution vulnerability, MS10-046'. Please download the security patch at http://www.microsoft.com/technet/security/Bulletin/MS10-046.mspx
06.19 | 0 komentar | Read More

7 Tips for Keeping Passwords


Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.

1. Not Using Default Password
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.

Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.

Wearing 2.Tidak Password Hint
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.

Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the penebak password.

Writing 3.Tidak Password
Owners are often afraid to forget your password with the password has been entered, so the owner would write different passwords user id and password into other media such as a notebook, notepad, Stickies (mac), password folders, books, mobile phones and other.

It is also quite vulnerable to leaking. Why vulnerable? Because when a variety of equipment is lost, then all information about a user id and password are sooner or later will be known by the thief equipments / gadgets are missing.

4.Menggunakan a Strong Password
Owner passwords often using a short password only, if it could be shorter than 3 characters then the user will give a short password. Fortunately this time the system provides a minimum password length of 6 characters and a maximum of 254 characters. The longer a password the stronger it will be the password security.

Strong passwords can be created with a combination of numbers and letters and even a variety of other characters. Some admins are currently using a password that is long enough, coupled with encryption such as PGP key and others, so it is quite difficult to guess password.

5.Sering Change Password
Owners should periodically change your password for authentication password, the more frequent password changes, the better, because the more difficult the penebak password hacking account / your system. Changes to the password depends on the owner, could be a week, a month, three months, and others. Originally the owner does not forget the password that was changed earlier.

6.Tidak Using Same Password on Multiple Accounts
Owners often forget and sometimes passwords frequently enough to create an account, so they each create a new account using the same user id and password are the same, this is very vulnerable and dangerous. Because these passwords through a single account, all accounts will be taken by the hacker.

7. Using Password Management
To help recall the various passwords and various accounts, we are often very difficult, but not to worry because it has many current applications to help organize our passwords. This application can be downloaded for free from the internet and paid, so that regardless of our account and whatever we can with the password easy to remember and re-opened, of course, to open it with an encryption method as well.
06.03 | 0 komentar | Read More
techieblogger.com Techie Blogger