Jumat, 01 Oktober 2010
Virus W32/VBWorm
The presence of virus W32/VBWorm.BEUA or better known as viruses that exploit security holes shortcut is quite disturbing. For, although labeled local virus, he not only take advantage of user negligence. But has more seriourly with a break through Windows security holes.
8 practical steps to kick the virus is able to change the folder that is in the USB flash disk into the shortcut
1. Non activated 'System Restore' as long as cleaning process.
2. Disconnect for the network
3. Turn off the virus active in memory by using the tools 'Ice Sword'. Once the tools are installed, select the file that has the icon 'Microsoft Visual Basic Project' and click 'Terminate Process'. Please download these tools at http://icesword.en.softonic.com/
4. Delete the registry that has been created by the virus by:
-. Click the [Start]
-. Click [Run]
-. Type Regedit.exe, and click the [OK]
-. In the Registry Editor application, browse the key [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]
-. Then delete the key that has the data [C: \ Documents and Settings \% username%].
5. Disable the autoplay / autorun Windows. Copy the script below in notepad and then save it as repair.inf, install the files in the following manner: Right-click repair.inf -> INSTALL
[Version]
Signature="$Chicago$"
Provider=Vaksincom
[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del
[UnhookRegKey]
HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""
HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoDriveTypeAutoRun,0x000000ff,255
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer, NoDriveTypeAutoRun,0x000000ff,255
6. Delete Files parent and duplicate files are created by the virus included in the flash disk. To expedite the search process, you can use the 'Search'. Before conducting the search should show all hidden files by changing the Folder Options settings.
7. Show re-folders have been hidden by the virus. To speed up the process, please download the tools Unhide Files and Folders in http://www.flashshare.com/bfu/download.html.
Once installed, select the directory [C: \ Documents and Settings] and folders that exist on the flash disk by moving into fields that are already available. In the [Attributes] clear all the options, then click the [Change Attributes].
8. Install security patches 'Microsoft Windows Shell shortcut handling remote code execution vulnerability, MS10-046'. Please download the security patch at http://www.microsoft.com/technet/security/Bulletin/MS10-046.mspx
Protect The Password
Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the other hands. 7 Ways to protect your password
- Not Using Default Password
- Not Using Password Hint
- Not Writing Password Anywhere.
- Using a Strong Password
- Frequently Change Password
- Not Wearing The Same Password on Multiple Accounts
- Always Using Password Management
Selasa, 21 September 2010
IT Security Landscape
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.
Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.
Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.
For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, etcDetail.............
Sabtu, 12 Juni 2010
jZebra Raw Printing API
100% Free and Open Source Sends raw print commands to your printer. (e.g. standard ESC commands, EPL commands, ZPL commands, PCL commands, etc.) Compatible with Windows, Mac OS X, Ubuntu, Solaris and more! Tested with Firefox, Safari, Internet Explorer, Opera Supports COM ports, Parallel ports, USB ports, Firewire ports, etc. Written in Java Loads in your web browser as an applet (similar to a flash object)
Features:
* 100% Free and Open Source
* Sends raw print commands to your printer. (e.g. standard ESC commands, EPL commands, ZPL commands, PCL commands, etc.)
* Compatible with Windows, Mac OS X, Ubuntu, Solaris and more!
* Tested with Firefox, Safari, Internet Explorer, Opera
* Supports COM ports, Parallel ports, USB ports, Firewire ports, etc.
* Written in Java
* Loads in your web browser as an applet (Similar to a flash object) you can free download jZebra 1.0.4 now.
Jumat, 09 April 2010
IT Governance
Information Technology Governance, IT Governance is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management. The rising interest in IT governance is partly due to compliance initiatives, for instance Sarbanes-Oxley in the USA and Basel II in Europe, as well as the acknowledgment that IT projects can easily get out of control and profoundly affect the performance of an organization.
A characteristic theme of IT governance discussions is that the IT capability can no longer be a black box. The traditional involvement of board-level executives in IT issues was to defer all key decisions to the company's IT professionals. IT governance implies a system in which all stakeholders, including the board, internal customers, and in particular departments such as finance, have the necessary input into the decision making process. This prevents IT from independently making and later being held solely responsible for poor decisions. It also prevents critical users from later finding that the system does not behave or perform as expected, as explained in the Harvard Business Review article by R. Nolan:
A board needs to understand the overall architecture of its company's IT applications portfolio … The board must ensure that management knows what information resources are out there, what condition they are in, and what role they play in generating revenue…
source:wikipedia
Kamis, 08 April 2010
COBIT
Control Objectives for Information and related Technology (COBIT®)
provides good practices across a domain and process framework
and presents activities in a manageable and logical structure. COBIT’s good practices represent the consensus of experts. They are strongly focused more on control, less on execution. These practices will help optimise IT-enabled investments, ensure service delivery and provide a measure against which to judge when things do go wrong. For IT to be successful in delivering against business requirements, management should put an internal control system or framework in place. The COBIT control framework contributes to these needs by:
• Making a link to the business requirements
• Organising IT activities into a generally accepted process model
• Identifying the major IT resources to be leveraged
• Defining the management control objectives to be considered
The business orientation of COBIT consists of linking business goals to IT goals, providing metrics and maturity models to measure their achievement, and identifying the associated responsibilities of business and IT process owners.
Indonesian:
Control Objective for Information and related Technology, disingkat COBIT, adalah suatu panduan standar praktik manajemen teknologi informasi. Standar COBIT dikeluarkan oleh IT Governance Institute yang merupakan bagian dari ISACA. COBIT 4.0 merupakan versi terbaru.
COBIT memiliki 4 cakupan domain, yaitu :
- Perencanaan dan organisasi (plan and organise)
- Pengadaan dan implementasi (acquire and implement)
- Pengantaran dan dukungan (deliver and support)
- Pengawasan dan evaluasi (monitor and evaluate)
Kamis, 14 Januari 2010
Facebook Smiley Code
Smiley can be used with one of the available codes.
happy :-) :) :] =) robot :|] curly lips :3 pacman :v upset >:O >:-O >:o >:-o confused o.O O.o squint -_- kiki ^_^ heart <3 kiss :-* :* angel O:) O:-) devil 3:) 3:-) | Shark (^^^) unsure :/ :-/ :\ :-\ cry :'( grumpy >:( >:-( sunglasses 8-| 8| B-| B| glasses 8-) 8) B-) B) wink ;-) ;) gasp :-O :O :-o :o grin :-D :D =D tongue :-P :P :-p :p =P sad :-( :( :[ =( Chris Putnam :putnam: |
Boost your Messenger with IMBOOSTER
Emoticons
Get Tons of FREE and EXCLUSIVE Emoticons designed for your Messenger !
BigEmos
For the first time send your buddies HUGE Emoticons
(5 times bigger than normal one )
Thanks to IMBooster, send exclusive video winks and create yours from your webcam
download
Rabu, 13 Januari 2010
HeidiSQL
HeidiSQL is an easy-to-use interface and a "working-horse" for web-developers using the popular MySQL-Database. It allows you to manage and browse your databases and tables from an intuitive Windows® interface. Download
POWER BUILDER 11.5
The latest version of PowerBuilder brings .NET interoperability enhancements, DataWindow innovations and many other new capabilities to make your job even easier, your applications even more robust and your development even faster. Here's what's new in PowerBuilder 11.5:
PowerBuilder is .NET
PowerBuilder gives developers the flexibility and power to bring existing applications into or build entirely new applications for .NET WinForms, WebForms and Smart Clients. Delivering on another phase in our .NET roadmap, PowerBuilder 11.5 provides:
* Support for Strong Named Assemblies
* The ability to access .NET static, primitive and enumerative classes
* Support for IIS7
Supplanting the need to “rewrite for .NET”, PowerBuilder 11.5 delivers rich, fresh applications with speed and ease.
DataWindow® Innovations
PowerBuilder 11.5 brings more advancements to the patented DataWindow - the fastest data access, manipulation and presentation tool around. With PowerBuilder 11.5, new and enhanced data visualization features provide even richer presentation of business data through a highly graphical and interactive user experience. DataWindow innovations include the ability to render pie, column, bar, line, and area charts all in 3D, special gradient and transparency features, and support for PNG files. Plus, Rich Text Edit style for columns has been added.
Simplifying Security
Additional security tools that enable you to deliver applications that meet today's protection, compliance and integrity needs are built right into PowerBuilder 11.5. PowerBuilder 11.5 now supports the Federal Desktop Core Configuration (FDCC) regulation required of all federal agencies and contractors. In addition, there is support for CAS (Code Access Security), allowing .NET applications to run in partially trusted zones.
New Native RDBMS Support
Continuing its tradition as an open tool, PowerBuilder 11.5 comes with native drivers for SQL Server 2008 and Oracle 11g for utmost developer efficiency and productivity.
Application Server Plug-in and PocketBuilder – For Free
PowerBuilder 11.5 (Enterprise Edition only) now ships with the Application Server Plug-in, which supports the ability to deploy into third-party application servers, directly from the PowerBuilder IDE. PowerBuilder objects can be deployed to JEE application servers where they will act just like EJBs. And for those of you with mobile development mandates, PowerBuilder 11.5 also comes with PocketBuilder, enabling agile Windows Mobile™ development
PowerBuilder Web Screen Shots
Here's a sampling of some of the UI and DataWindow enhancements found in PowerBuilder 11.5. Click each screen capture to view larger.