Jumat, 01 Oktober 2010

Virus W32/VBWorm


The presence of virus W32/VBWorm.BEUA or better known as viruses that exploit security holes shortcut is quite disturbing. For, although labeled local virus, he not only take advantage of user negligence. But has more seriourly with a break through Windows security holes.

8 practical steps to kick the virus is able to change the folder that is in the USB flash disk into the shortcut

1. Non activated 'System Restore' as long as cleaning process.

2. Disconnect for the network

3. Turn off the virus active in memory by using the tools 'Ice Sword'. Once the tools are installed, select the file that has the icon 'Microsoft Visual Basic Project' and click 'Terminate Process'. Please download these tools at http://icesword.en.softonic.com/

4. Delete the registry that has been created by the virus by:
-. Click the [Start]
-. Click [Run]
-. Type Regedit.exe, and click the [OK]
-. In the Registry Editor application, browse the key [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]
-. Then delete the key that has the data [C: \ Documents and Settings \% username%].

5. Disable the autoplay / autorun Windows. Copy the script below in notepad and then save it as repair.inf, install the files in the following manner: Right-click repair.inf -> INSTALL

[Version]

Signature="$Chicago$"

Provider=Vaksincom

[DefaultInstall]

AddReg=UnhookRegKey

DelReg=del

[UnhookRegKey]

HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""

HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"

HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoDriveTypeAutoRun,0x000000ff,255

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer, NoDriveTypeAutoRun,0x000000ff,255

6. Delete Files parent and duplicate files are created by the virus included in the flash disk. To expedite the search process, you can use the 'Search'. Before conducting the search should show all hidden files by changing the Folder Options settings.

7. Show re-folders have been hidden by the virus. To speed up the process, please download the tools Unhide Files and Folders in http://www.flashshare.com/bfu/download.html.
Once installed, select the directory [C: \ Documents and Settings] and folders that exist on the flash disk by moving into fields that are already available. In the [Attributes] clear all the options, then click the [Change Attributes].

8. Install security patches 'Microsoft Windows Shell shortcut handling remote code execution vulnerability, MS10-046'. Please download the security patch at http://www.microsoft.com/technet/security/Bulletin/MS10-046.mspx

Protect The Password


Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the other hands. 7 Ways to protect your password

  1. Not Using Default Password
  2. Not Using Password Hint
  3. Not Writing Password Anywhere.
  4. Using a Strong Password
  5. Frequently Change Password
  6. Not Wearing The Same Password on Multiple Accounts
  7. Always Using Password Management

Selasa, 21 September 2010

IT Security Landscape


Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.

The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.

Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.

Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.

Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.

For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.

The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, etc

Detail.............

Sabtu, 12 Juni 2010

jZebra Raw Printing API


100% Free and Open Source Sends raw print commands to your printer. (e.g. standard ESC commands, EPL commands, ZPL commands, PCL commands, etc.) Compatible with Windows, Mac OS X, Ubuntu, Solaris and more! Tested with Firefox, Safari, Internet Explorer, Opera Supports COM ports, Parallel ports, USB ports, Firewire ports, etc. Written in Java Loads in your web browser as an applet (similar to a flash object)

Features:

* 100% Free and Open Source
* Sends raw print commands to your printer. (e.g. standard ESC commands, EPL commands, ZPL commands, PCL commands, etc.)
* Compatible with Windows, Mac OS X, Ubuntu, Solaris and more!
* Tested with Firefox, Safari, Internet Explorer, Opera
* Supports COM ports, Parallel ports, USB ports, Firewire ports, etc.
* Written in Java
* Loads in your web browser as an applet (Similar to a flash object) you can free download jZebra 1.0.4 now.

Jumat, 09 April 2010

IT Governance


Information Technology Governance, IT Governance is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management. The rising interest in IT governance is partly due to compliance initiatives, for instance Sarbanes-Oxley in the USA and Basel II in Europe, as well as the acknowledgment that IT projects can easily get out of control and profoundly affect the performance of an organization.

A characteristic theme of IT governance discussions is that the IT capability can no longer be a black box. The traditional involvement of board-level executives in IT issues was to defer all key decisions to the company's IT professionals. IT governance implies a system in which all stakeholders, including the board, internal customers, and in particular departments such as finance, have the necessary input into the decision making process. This prevents IT from independently making and later being held solely responsible for poor decisions. It also prevents critical users from later finding that the system does not behave or perform as expected, as explained in the Harvard Business Review article by R. Nolan:

A board needs to understand the overall architecture of its company's IT applications portfolio … The board must ensure that management knows what information resources are out there, what condition they are in, and what role they play in generating revenue…

source:wikipedia

Kamis, 08 April 2010

COBIT


Control Objectives for Information and related Technology (COBIT®)
provides good practices across a domain and process framework
and presents activities in a manageable and logical structure. COBIT’s good practices represent the consensus of experts. They are strongly focused more on control, less on execution. These practices will help optimise IT-enabled investments, ensure service delivery and provide a measure against which to judge when things do go wrong. For IT to be successful in delivering against business requirements, management should put an internal control system or framework in place. The COBIT control framework contributes to these needs by:
• Making a link to the business requirements
• Organising IT activities into a generally accepted process model
• Identifying the major IT resources to be leveraged
• Defining the management control objectives to be considered

The business orientation of COBIT consists of linking business goals to IT goals, providing metrics and maturity models to measure their achievement, and identifying the associated responsibilities of business and IT process owners.

Indonesian:

Control Objective for Information and related Technology, disingkat COBIT, adalah suatu panduan standar praktik manajemen teknologi informasi. Standar COBIT dikeluarkan oleh IT Governance Institute yang merupakan bagian dari ISACA. COBIT 4.0 merupakan versi terbaru.

COBIT memiliki 4 cakupan domain, yaitu :

  • Perencanaan dan organisasi (plan and organise)
  • Pengadaan dan implementasi (acquire and implement)
  • Pengantaran dan dukungan (deliver and support)
  • Pengawasan dan evaluasi (monitor and evaluate)

Kamis, 14 Januari 2010

Facebook Smiley Code

If you frequently chat on facebook and like to use the smiley, here are smileys code can be used in Facebook chat.
Smiley can be used with one of the available codes.


happy :-) :) :] =)

robot :|]

curly lips :3

pacman :v

upset >:O >:-O >:o >:-o

confused o.O O.o

squint -_-

kiki ^_^

heart <3

kiss :-* :*

angel O:) O:-)

devil 3:) 3:-)

Shark (^^^)

unsure :/ :-/ :\ :-\

cry :'(

grumpy >:( >:-(

sunglasses 8-| 8| B-| B|

glasses 8-) 8) B-) B)

wink ;-) ;)

gasp :-O :O :-o :o

grin :-D :D =D

tongue :-P :P :-p :p =P

sad :-( :( :[ =(

Chris Putnam :putnam: