Showing posts with label security system. Show all posts
Showing posts with label security system. Show all posts

Monday, December 26, 2011

Hackers Steal Apple, Microsoft and U.S. Government Data in stratfor website

Anonymous Hacker group again make a trouble. This time the group claims to have successfully hacked the Stratfor website, the company that has clients such as Apple, Microsoft and a number of important institutions of  the United States government.

Stratfor itself is one company that offers consulting services about the tactical and strategic intelligence, security analyst at a company, and demographic politics in some countries.

It is said that companies from the United States that have very few clients are kept confidential as the U.S. Defense Department, U.S. Army, Air Force, law enforcement agencies, security contractors, and leading technology companies like Apple and Microsoft.

Quoted from AFP on Monday (12.26.2011), Anonymous hacker group claimed to have managed to get thousands of critical data owned by companies that use the services of Stratfor, including Apple and Microsoft.

It was also proved by trying to expose some evidence like a screenshot of the data, as well as special links Stratfor refer to the actual client is strictly confidential.

Ironically, a group of hackers who stuck out his name in the scandal sites 'whistleblower' WikiLeaks says that Stratfor does not encrypt data on its users, allowing you to easily read.


Friday, December 23, 2011

Adding Password on Shared Folder Document


For those of us who frequently interact with computer networks, may be often heard and used the names sharing folders in Windows. If using Windows XP to share folders or files, by default operating system (OS) will not provide a password when you access it via another computer. This becomes a little dangerous when you want to share important documents that actually only be known by some person of interest only.
To overcome these problems, Windows has provided operating system (OS) itself which gives flexibility to the administrator to manage the network, including providing security on any folder in windows server that is shared. However, it is also not the best solution if only for the purposes of a temporary or immediate need.

To provide a password in Windows XP folder sharing, follow these steps:


  1.     Login as Administrator Windows XP
  2.     Click Start -> Control Panel -> User Accounts
  3.     Click the Guest account and make sure the Guest user becomes active (On)
  4.     Close the User Accounts window
  5.     Open Command Prompt by clicking Start -> Run, type CMD and then press the Enter key
  6.     At the Command Prompt, type net user guest password and press the Enter key
  7.     Go back and give the user account password on the user guest
  8.     Enter the password that you want and then restart the computer
  9.     Once finished restart the computer, try sharing a folder on the computer before
  10.     Open the folder that was shared by another computer. If no errors, then when we access it from another computer, the system will prompt to enter a password to access the folder

It's finished, we are sharing a folder that is protected with a password. Users who do not know the password we set earlier will not be able to read files or folders that you have previously sharing.


Friday, November 11, 2011

How to protect your computer from the virus in Internet

The computer is still a mainstay device for accessing the internet. Secure computer is one of the capital for cruising the Internet activity takes place smoothly. This is because computers are secure better able to ward off an attack or malicious programs that try to get through the internet. If you often become victims of virus attacks, it could be your computer is not powerful enough to ward off incoming attacks.

Here are four important capital to protect your computer:

  • Make sure the firewall is always in a position "on". A firewall is a software that can counteract the illegal access to computers, whether they intend to remove the information, computer damage, or steal personal data. If you use more than one computer connected together, make sure the firewall on each computer is active. This is to prevent the virus spreading to all computers if one computer is infected.
  • Use software and operating system up-to-date. The latest update, let alone the nature of the high priority it is important to computer security. Update software usually contains the latest protection, as well as improvements to the bugs and security loopholes that exist in previous versions.
  • Always update antivirus software. Antivirus technologies are better able to ward off viruses and spyware that attack your computer, rather than the antivirus with the old technology.
  • Brainware factor (human) also plays an important role. Always be alert and careful, as not just open an attachment in an e-mail or link that is not known exactly what it says. Attachments or links it may contain viruses or other malicious programs. Do not download any, except from a trusted site, and read all security warnings, license agreements and related privacy of any software you download.


Saturday, November 5, 2011

how to secure your Facebook account

Lately we hear piercing rampant around our Facebook account. How could this happen? Though most of us have a strong belief in the social networking service is daily communication. Then, at least the next question is how to secure your Facebook account us from this threat.

Here are the steps in anticipation that can be taken to secure our Facebook account.

1. Avoid Login via http://www.facebook.com, because this page is not encrypted. Your login information is encrypted, but due to the login form is set in a frame, the user can not see if everything is encrypted or not.

2. Perform the login process you from page https://login.facebook.com/login.php?login_attempt = 1. You can be sure that you do secure login to check the bottom right of the browser that displays the 'lock sign'.

3. Do not continue the login process if there is a hazard warning (security alert). You can immediately stop the process of 'unsafe' by the 'Esc'.

4. Do not forget to always LOGOUT accessing your Facebook account. By simply turning off the browser without the Log out, then you've left the 'session' to be accessible to others. Is therefore very important to you always do the Logout.

5. Do not be accustomed to working with the right as a systems administrator. It would be very dangerous if you open the email, images and documents by using the administrator account, as this would open up the possibility for cyber criminals to take over your computer.

6. Beware of Malicious Facebook Widget. Widgets or additional applications can provide an opportunity for the author to insert coding programs to access vital information from the target computer. Until now there are two kinds of malicious Facebook Widget that reportedly attacked Facebook users, the Secret Crush and Error Check System.

7. Be careful in selecting a computer for wear. If you are accustomed to using a public computer or multiple computers, such as the rental or Internet cafes (cafe), then you should be careful in choosing and using. This is due to the absence of guarantees maximum security update from that computer. Though computers have been infected with Koobface Worm, or keylogger can steal user data and password.

8. Be careful in choosing a network of Wi-Fi Internet connection. Only Facebook login process uses an encrypted SSL / TLS (https). Meanwhile Facebook cookies will very easily be taken from the air (via a Wi-Fi signal the Internet). Wi-Fi protected WEP encryption that can easily be broken in 10 minutes. Nowadays everyone can just as easily create hotspots and provide free-access to you. But you should be aware of is the security level access is offered, because with access Facebook on a network connection that is not protected, the same as giving your private data free of charge.

9. Think about security issues before you do click on the 'Wall'. Post on Wall is one way of spreading Koobface or other malware, so you must be careful to access it.

10. The latter is the way how we are raising awareness of the dangers of Facebook's security is on the people around us. Due to the increasing awareness of people around us will also support our security.

I hope this tips about how to secure our Facebook account will be useful for all facebook users around the world.


tips for playing games safe in cyberspace

Playing games online is fun, but you must remember that much of a threat that haunts. Here are five tips for playing games safe in cyberspace who mixed security Eset company

1. Always use regularly updated antivirus and computer security solutions that have anti-spyware and firewall features.

2. Use passwords for different accounts and create passwords that difficult to guess, and do not make too simple.

3. Please type in the URL or website you want online games directly in your browser or use existing bookmarks in the browser. That way you'll avoid the element of chance online game click on a link from a search engine that has been infected.

4. Protect data with a password protector either on computer or in the cloud.

5. Never use the software crack, because it could be a rogue software or malicious software. "High performance and does not affect the quality of games played. Two things are important indicators in choosing antivirus software," said Marcel 'k1llsen' Paul, an e-sports gamer who is currently ranked top in the top ESC gaming leagues in Germany.


Saturday, October 29, 2011

The importance of Security in the web Hosting

Are you confused in choosing the right hosting provider? There are hundreds of hosting providers in the world that offers various services that vary the type and quality. Approximately which one should you choose? What factors should you consider? One of the important thing that you should consider in choosing website provider is the Security.

The more important your website or online company, the more importance is the stability and uptime. There are several things that influence the stability / uptime, ie machines, networking, and security software such as the configuration used by computers and computer are generally not charged any more than 200-300 account so as not to burden the access. Security server must also be considered because the server which is often hacked will be frequently down even frequent loss of data, something very disturbing in the operation of the server. Spammer or fraudulent users who try to destroy the security, or install software that also must be considered suspicious. This is because the servers that send spam will tend to be blacklisted by other servers, it will cause the other accounts on the same machine disturbed the email. Likewise, software that is suspicious sometimes consumes the resource CPU / memory.

Security in the network or webhosts server must be powerful. We cannot deny that security is one of the most important things in business and also in the Internet. At this time there is no one perfect technology which is able to withstand the attacks of this hacker. How can we minimize the possibility of this attack? The easy way is to ask whether the webhost provider is providing a person who is experts in the field of network security. Usually what we want is how they monitor the activity on the network for 24 hours that can detect fraudulent and unusual activity before the activity become worst that can endanger our website.


Friday, July 29, 2011

Dynamic Disk Manager Free Partition Manager for Windows

Dynamic Disk Manager Free Partition Manager for Windows If Partition Manager is the default in Windows 7 is basic and doesn't allow for advanced resizing or managing partitions. There are many free disk manager for Windows includes a Partition Manager EASEUS Partition Master Free and.

Dynamic Disk Manager is a new freeware tool is in beta and allows you to manage partitions on Windows. This application is compatible with Windows 7 and allows you to easily manage, create and change the size of the partition.

Note: the application is currently still in beta testing phase, so if you want to use you could try but only for testing purposes.

The application interface is pretty simple and comes with a feature along with a list of all available partitions on your PC and then you can select any task for a particular partition by selecting. This gives you full control over your PC & Server to maximize the use of disk space and optimize the performance of the computer to its full potential.

The main feature of this application;

Resize dynamic disk to fix the structure hard driveMengecilkan/Extend dynamic volumes with sederhanaMemperpanjang dynamic system volume for the unallocated space to set up the spaceMenindahkan slice dynamic volume configurationAdd drive for Software RAID 0 and RAID-5Remove drive from Software RAID 0 and RAID-5Mengkonversi a basic disk to the GPT disk to MBR dinamisMengkonversi a disk and vice versa

The beta version will expire on July 31 and the final version will be released in August. The developer has said that the application will have a home version will be provided as freeware.

Home

http://dynamic-disk.com/ddm-beta-testing.html

Download Dynamic Disk Manager

http://www.dynamic-disk.com/down/DDM_Beta.exe


Saturday, July 16, 2011

What You Should Consider Before Buying A Product online

Yesterday I got an email that it reads like this "how to know that the products it offers quality and isn't fraud?". "How do I know that after the transfer of money, I will certainly obtain the products?". Confusion like this you may experience when want to buy a product online, or when it intends to become a reseller of the product.
It is not easy to answer this question, but OK I'll try to compare with my experience as a computer Technician Guide ebook seller for approximately 7 months.
As a buyer, before buying a product, here's all you have to make sure:

Who is behind these products? Never buy products from people you do not know. Sellers of products must be in accordance with their fields. For example, because I have a blog agussale.com about computers and the Internet, then it is reasonable if I sell ebooks Guide computer technician. What word other people about these products? Is there a testimony concerning such products are believed to be bias? For example I sell ebooks Guide computer technician, then I would attach a "TESTIMONIALS" on the website www.dpcworld.comApakah this product is of interest to many people? Whether the product has been many purchasers? As an example since I sell ebooks Guide computer technician in November 2010, the number of total users is the number of people with the current Registrar who has yet to conduct transactions is 142 people. Means closing the prospect is still quite a lot.If the price of its products in accordance with the quality of the product? Please compare the contents of the book to your needs, money is not your main problem.Is this product bergaransi? What kind of warranty? All you need is an unconditional guarantee. If a guarantee is conditional, that is the sign of a good deal less.Is the website accessible? If we can reach people directly? For example, I only had one no. 081355121794 and no. HP HP should you use to contact me anytime. That's how I apply in my ebook sales.What are the advantages of this product compared to other products? Do not buy the product before comparing it with similar products from other sources. Please compare both in terms of its content, price and warranty.

So this brief explanation, hopefully help you in choosing and buying products online.

Note: for email senders, answers on purpose I write here that fair-to-read all the articles and not as a promotional language.



Wednesday, June 22, 2011

Install antivirus in your flashdisk

Safety and "health" computer is absolutely expected and required by all computer users to use computers in their activities become more comfortable and safer. Many ways and the way computers are used in order to remain healthy and in fit condition and performance. One is to prevent attacks from malicious viruses by using antivirus always updated of course. Of the many ways the spread of viruses that infect computers, the most widely and efficiently is through storage media or removable disk (flash).

Virus infected flash will easily infect other computers when the flash is plugged in and then accessing or opening a file in flashdisk. From one computer to another computer flash is taking computer virus which then spread it to others.

For the safety of virus attacks from flash, it is recommended that before accessing the flash is always on and always do the scanning of the flash. Rely on antivirus alone is not enough. Sebaiknyalah friend try this one tool that truly free and portable, so do not overload the computer's performance. And again it is also powerful tools to clean the virus contained in the flash, because this tool is dedicated to eradicate the virus in flash, not on my hard drive. Some examples of viruses that attack through the flash is autoruns.inf, auto.exe, autorun.ini, ctfmon.exe, copy.exe, Macromedia_Setup.exe, ntde1ect.com, New Folder.exe, soundmix.exe, svchost.exe, semo2X.exe, windows.scr and others.



This tools is only 746 KB is called ninja pendisk. When running this tool will run on the system tray and can be set to run at startup, automatic clean and disable autoplay by right clicking on the icon in the system tray. Kerjanyapun very easy way. run this tool and then plug your flash, then this tool will work immediately and clean the flash of a virus is identified.

If you curious and intend to try it can download at the link below:



Secure your computer with SUPERAntiSpyware portable

To maintain the security and comfort of your computer from attacks of Spyware, but to use updated antivirus installed on your computer, you should also use anti-spyware software. Especially if the computer is always connected to the internet then this anti-spyware is necessary for use. One anti-spyware programs are powerful enough to prevent or eliminate or get rid of spyware, Adware, Malware, Trojans, Keyloggers, Dialers, Hi-Jackers, and Worms that attack the computer is SUPERAntiSpyware. SUPERAntiSpyware can also catch the fake anti-virus that attacks computers.

Because it is portable, it is not necessary to download SUPERAntiSpyware and installed on your computer and can carry around where to use removable media like flash or cd.



To get it for free, shobat can download anti-spyware software is on the link below. After shobat download, save the file to a flash SUPERAntiSpyware or compact disc. Next run antispyware programs to detect the presence of spyware, adware, Malware, Trojans, Keyloggers, Dialers, Hi-Jackers are nested dikomputer. Where necessary update the definitions by clicking on the check updates.


Saturday, June 18, 2011

How to activate parental controls in Windows 7

Internet users increasingly growing and will continue to grow with the passage of time. Including children, Internet users among the kids has now become commonplace and should indeed, children are taught about the internet. Of the many benefits gained by using the internet, but there are also shortcomings and weaknesses. Among them are violent content, pornography, and even many children to teenagers and even adults even become victims of online crime via the internet. Therefore, as parents would and should be obliged to guide and keep the kids do not get caught and thrown to the things that are negative consequences of using the internet.

As one way of control of parents of children in the surf, is to use or activate the parental controls in Windows 7. For that follow these steps:

  • Before moving, I assume that you are the parent of the child and as an administrator user of the computer or your laptop.
  • Create new user account for your child. The trick, open the Control Panel and select User Accounts.
  • Select Manage Another Account and then click Create a new account.

  • Name the account in accordance with the wishes and select the Standard user, then click Create Account. (New account has been created)
  • Click Start, then type the parental controls and press enter.
  • Choose your child's account or the account you just created above.



  • Please note your account as an administrator should be given a password in advance, so that your child's account can not access the administrator account.
  • In the window that appears, activate the parental controls by selecting the option On, enforce current settings.


  • Underneath there are 3 settings windows settings.
  • Time limits. Set the time allowed and the forbidden time to surf. The color blue is a time that is prohibited while the white color is the time allowed. Click OK

  • Games. Select yes on the options the user can play games. Click the Game settings. Select the Block option games with no rating or select the block or allow specific games. Click OK


Allow and block specific programs. Select the settings can only use the programs I allow. Then select what programs are allowed and which should not be run. Click OK

Hopefully with these settings, children can still surf studying and playing without having to become victims of negative influences from the internet. And do not forget, guard and guide your child in a play on the internet, is expected to be intellectual.


Monday, May 9, 2011

Hotspot Shield 1.57 Free Download

Currently very difficult to keep your privacy! Every Internet user, whether large or small sizes to try to track your movements. Some of them say that his actions are to serve relevant ads, without intent to harm you. Regardless of what they say, it is a wise action when you protect yourself from the efforts to spy on your movements on the internet.

KomputerTips.com already gives some the best free antivirus software to protect computers and files you from virus threats, malware, trojan and more! Antivirus is indeed good to keep your computer and identify trusted sites that you explore, and Hotspot Shield is one of the software is free and anonymous web surfing tool that deserves to be owned not only for protecting your privacy, but also as a security tool.

Hotspot Shield

Not enough to protect your computer from dangerous threats virus infection, you also have to secure your web session and personal and confidential information that you share with a trusted site! With so many people online today, then the trusted anonymous web surfing tool that keeps your privacy and security plays an important role. Hotspot Shield is one tool that offers protection that are relevant and are also available for free. Although this tool was originally intended to be used when surfing the web, public places like airports, railway stations, cafes, etc., but it is also important to use it on your computer at home.


Hotspot Shiled What to do?

Here's a web proxy tool is doing:

Securing a web session that you do, data, online shopping, and personal information online with the advanced data encryption technology (HTTPS)!
Protects you from identity theft.
Allows you to access all private content without any censorship, bypassing the firewall.
Protects you from snooper on a public computer kiosks such as wi-fi hotspots, hotels, airports, and other.

Download Free Hotspot Shield

After downloading the file (exe) above, double-click and then click "Download" to start downloading and installing Hotspot Shield via anchorfree download manager! During installation, make sure to remove the check mark to set the "Search" page as your home page and also make the search default gateway!

Hotspot Shield Free Download

Hotspot Shield offers protection for wired and wireless connections, this tool also works to create a virtual private network (VPN) between their computers and the Internet gateway. This tool works on Windows 7, Windows XP, and Vista computers also MAC.

Run Hotspot Shield and enjoy security when bersurfing internet.

Safe with Hotspot Shield

If you do not want to use this tool on each web session, you can decide through hotspot shield icon on the taskbar.

Hotspot Shield Free Download:
http://www.hotspot-shield.com/downloads/thank-you/?type=na&


Friday, May 6, 2011

Beware of Phishing Threat on Xbox 360


When the focus world attention to hacker attacks against the PlayStation Network (Sony), which have a direct impact on users of the PlayStation 3, Xbox 360 users apparently (Microsoft) is also not free from threats.

Pointed out, there is the threat of phishing to the user via the Xbox 360 game Call of Duty: Modern Warfare 2. Similarly, as reported by Yahoo News, Wednesday (04/05/2011).

Although not as severe as an attack on Sony, which causes paralysis of the PSN network, Microsoft clearly does not want to missed. They have sent a warning to all Xbox Live users to be aware of this risk.

"The users will probably be the target of phishing attacks through certain messages when you're playing Modern Warfare 2. We have recognized this problem and is working to resolve it,"was the warning that was brought up by Microsoft.

Microsoft also warned users of the Xbox is not easily tricked into giving their Windows Live ID password via email, instant messenger or mobile phone. The reason, both Microsoft and the Xbox will not ask for password users through a third communication medium.

Users are advised only to type the password on the official websites of Microsoft or via their Xbox 360 console.

If an Xbox Live account was successfully penetrated, then the user is expected to contact the Xbox Support immediately.


Tuesday, May 3, 2011

Sony Online Entertainment Shut down for Issues Security

Sony Online Entertainment (SOE), an online game development company owned by Sony, to suspend their services after discovering a hacker has gained access to 23,400 credit and debit cards from its customers outside the United States.

Part of the division of Sony Corp. It also adopted a policy to disable their service since Monday (02/05/2011) night. The company that produces EverQuest and DC Universe Online is to say, security consultants and energy experts have discovered the theft of personal information of 24.6 million customer accounts SOE.

Theft includes 12,700 non-US credit card or debit card and expiration date. However, Sony said, the credit card information may have been stolen did not include security code card or pin, which serves as the source of the second authentication.

Taina Rodriquez SOE spokesman also confirmed that the inroad of this data is not attack the second. "Closing these SOEs while services related to the ongoing investigation against internal disturbances that occurred in April," he said.

This data theft occurred in 10 700 debit cards from customers in Austria, Germany, the Netherlands, and Spain. The information obtained from this debit card, among others, customer name, bank account number and account name.


Twitter Delicious Facebook Digg Favorites More