This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Selasa, 17 April 2012

New Hacking Method

Akhirnya sikebo mengeluarkan versi terbarunya. Versi terbaru ini mendukung hacking semua tipe
hp nokia yg tidak bisa dilakuan oleh kebo sebelumnya dalam hack freeware terbaru

Cara penggunaannya:
kalian diharuskan mensigned kebo ini sebelum menginstalnya .dengan cara req cert dan key di Disini
cert dan key kalian akan diproses paling lama 24 jam.
Setelah berhasil mendapatkan cert dan key ,masukan di setting pada aplikasi freesigner. Dan kalian bisa langsung signed kebo
dan instal

Apa aja yang dilakukan pada saat penginstalan?

Pada nokia v5 dan v^3:
1. Install CertProvisioner
2. Install root Certificate
3. Unpack modded
Installserver *not
for 3rd FP2*
4. Install files Mover
*UnHacking need that* &
Move modded
Installserver *non-3rd FP2*
5. Install RomPatcher+ (by
Il.Socio)
*not for Symbian^3*
6. Done! non-Nokia phone
models:

Pada nokia v3:
1. Map drive
2. Unpack Hacking files to
the
virtual drive
3. Activate file system
4. Unmap drive
5. Install root certificate
6. Install RomPatcher+ (by
Il.Socio)
7. Done

Jenis tipe Nokia yang mendukung:
Nokia 5800, Nokia 5230, Nokia 5233, Nokia 5250, Nokia 5228, Nokia 5235, Nokia 3250, Nokia 5320, Nokia 5500, Nokia 5530, Nokia 5630, Nokia 5700, Nokia 5730, Nokia 6110, Nokia 6120, Nokia 6124, Nokia 6210, Nokia 6220, Nokia 6290, Nokia 6650, Nokia 6710, Nokia 6720, Nokia 6730, Nokia 6760, Nokia 6788, Nokia 6790, Nokia: E50, E51, E52, E55, E60, E61, E62, E63, E65, E66, E70, E71, E72, E75, E90, N8, N71, N73, N75, N76, N77, N78, N79, N80, N81, N82, N85, N86, N91, N92,N93, N95, N96, N97, N97 mini, X6, C7-00, E7-00, C5-03, C6.

DOWNLOAD DARI SUMBER






 

Source : http://forum.djawir.com/

Kamis, 29 Maret 2012


Anyeong Haseyo :-)
ternyata apa yang suka di umbar-umbarkan di dalam Film maupun sinetron di amerika tentang teknologi penyadapan yang di gunakan oleh agen rahasia amerika bukan lagi sebuah isapan jempol belaka buktinya ada orang yang berani menulis artikel tentang hal ini mudah-mudahan saja orang ini tidak di hakimi massa ketika kedapetan menyadap hasil pemilihan Gubernur DKI hehe GBU 
MENYADAP TELPON MENGGUNAKAN HT (HANDY TALKY)
     
Short story ;
~~~~~~~~~~~~~
Masih ingat dengan berita dimasa lampau tentang dua sosok anak muda (kakak beradik) yang berasal dari salah satu negara di Eropa berhasil menyadap pesawat luar angkasa milik Rusia (Soyuz) yang pada waktu itu sedang mengalami kecelakaan.

Setelah sukses menyadap pesawat soyuz. Dua bersaudara tersebut merekam pembicaraan para astronot. Hebatnya lagi, suara denyut jantung astronot pun juga bisa mereka rekam. Namun karena tidak mengerti bahasa Rusia, mereka pergi mencari temannya yang bisa dan mengerti bahasa Rusia untuk menerjemahkan pembicaraan astronot yang baru saja direkamnya.
Hasilnya, mereka mengetahui secara pasti dan jelas penyebab kematian astronot pesawat soyuz. mulai dari apa yg dilakukan astronot sebelum tewas , dan kerusakan yang ada pd pesawat soyuz.

Mengetahui hal itu mereka mempublikasikan data yang didapatnya. Setelah dilakukan verifikasi ternyata data itu cocok dengan apa yang terjadi pada saat astronot pesawat soyuz mengalami kecelakaan. Tidak lama kemudian, mereka berdua diundang datang ke stasiun luar angkasa Amerika (NASA) untuk melakukan jumpa pers. Dalam pengakuannya, selain bisa menyadap pesawat soyuz, sebelumnya mereka juga pernah menyadap pesawat luar angkasa milik Amerika (NASA) hanya dengan berbekal mengetahui gambar antenanya saja.
Start ;
~~~~~~~
Kali ini Mr.Brokn menemukan kebocoran frekwensi telpon yang ada di BLI**R. Frekwensi tersebut berada disekitar 13000 hz sampai dengan 14000 hz. Akibatnya, pembicaraan lewat telpon bisa disadap cukup dg menggunakan HT (Handy Talky).
Mr.Brokn sarankan agar mempergunakan HT jenis digital seperti ICOM V68 , ALINCO DJ180 dan lain sebagainya. Pokoknya yang penting digital. Karena HT digital lebih mudah dalam pengoperasiannya.
1. Hidupkan HT
2. Lihat LCD / Display pada HT.
- umumnya memiliki 7 digit angka | 14.000 00 |
- frekwensi standart yang biasa dipakai komunikasi antar penduduk adalah 14.000 00 hz sampai dengan 14.999 00 hz (itu di Bli**r. kalo di kota lain Mr.Bro kurang begitu tahu). ~~~~~~
3. Rubah frekwensi lebar yang sebelumnya 14.000 00 hz menjadi 13.000 00 hz
- pengubahan ini cukup dengan menekan tombol angka angka yg ada pd HT tersebut.
4. Naikkan frekwensi 13.000 00 hz menjadi 13.001 00 hz naikkan lagi menjadi 13.002 00 terus menerus sampai menemukan sinyal berbunyi tuuu..tttuu.tu..t (seperti nada panggil pada telpon) atau juga sampai menemukan suara orang yg sedang ngrumpi.
- pencarian lebih mudah lagi jika HT yang dipergunakan memiliki fasilitas scan. cukup dengan menekan tombol scan. Frekwensi HT tersebut akan naik sendiri dan akan berhenti apabila telah menemukan sinyal. (otomatis)
- scan antara frekwensi 13.000 00 hz sampai dg 13.999 00 hz. (pasti ketemu)
5. Kalo telinga udah panas. Matikan aja HT nya nanti lama kelamaan malah bikin telinga jadi BUDHEG
Antena ; ( lihat skema gambar antena )
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Agar lebih banyak target yang ingin disadap. Keberadaan antena sangatlah mempengaruhi. Lebih baik jika mempergunakan antena luar. dg ketinggian 12 m diatas tanah. lebih tinggi lebih bagus.
Pakai antena jenis RING O karena antena RING O lebih kuat dalam menerima sinyal. Antena telecs juga bisa, tapi menurut Mr.Bro kualitas penerimaan sinyal kurang bagus.
Apabila menggunakan antena pengarah/Yagi, arahkan antena tersebut ke arah rumah no telpon yang akan disadap atau juga bisa mengarahkannya ke kantor PT Tel**m tbk di masing masing daerah.
Bisa juga mengarahkan ke arah tower tower pemancar telp cellular.
dasar tukang nguping hihiii…..
sorry banget k’lo sketsa kasar gmbr antena tdk Mr.BroknH tampilkan soalnya waktu dipreview. hasilnya acak2 an.
(gmbr 1.1) (gmbr 1.2) (gmbr 1.3)
Keterangan ;
gmbr 1.1 = gambar antena telecs
gmbr 1.2 = gambar antena ring o
gmbr 1.3 = gambar antena pengarah / yagi
note : skema gambar antena diatas biasanya banyak dipakai radio HT. Karena harganya yang relatif murah dan mudah dibeli dipasaran.
Tambahan ;
~~~~~~~~~~
Usahakan agar antena , kabel dan pesawat HT dalam kondisi matching. dengan perbandingan (1:1,1). Asalkan jangan sampai (1:1,5). Dan lakukan pentanahan pada tegangan negatif pesawat HT. kabel RG 58 (bagus) , RG 8 (lumayan bagus) , Fibre optic (sangat amat bagus)
____________________________________________________________________________
Adapun kelebihan dan kekurangan dari trik ini adalah
Kekurangan ;
~~~~~~~~~~~~
1. Nomor telpon yang disadap sifatnya random (acak). artinya kita tidak bisa menentukan
no telp yang ingin disadap.
2. Nomor telpon yang disadap biasanya salah satu pihak ( entah itu yg menelpon atau yang ditelpon) sedang melakukan akses komunikasi ke luarkota/interlokal , akses ke luarnegeri/SLI, akses dari hp ke telp rumah , akses dari telp rumah ke hp.
- ketika Mr.Brokn melihat sinyal yang masuk pd HT dan dari bunyi DTMF tombol yang ditekan. si penelpon menekan lebih dari 6 digit. Padahal akses lokal di Bli**r cuma dibatasi 6 digit.
- Tetapi kalau lagi beruntung, dapat menyadap telpon yg sedang melakukan akses lokal.
3. Setahu Mr.Brokn pada malam hari sering terjadi kebocoran frek. Apalagi malam minggu. Wuih….buanyak bangets orang yang lagi ngrumpi. Bahkan ada yang romantis segala.(hehehe…) seperti baca puisi, kata mutiara dan lain sebagainya. Lebih bahaya diwaktu tengah malam, soalnya omongannya udah pada nglantur.(terlalu vulgar untuk dibicarakan. kakakaa… hihihihi …eheheheh). Mr.Brokn gak bohong loh..!!!!
Kelebihan ;
~~~~~~~~~~~
1. Selama ini Mr.Brokn koq belum menemukan keuntungan dari trik ini yach…..hiihiihihi. yang jelas merugikan orang lain, lho kenapa ? soalnya khan privacy orang lain yang lagi enak enak ngobrol lewat telpon jadi terganggu / terbongkar.
2. Bisa buat teman dimalam hari. sambil belajar, minum kopi, sedikit menghisap sebatang cigarette[234] + dengarin orang yg lagi kasmaran. hikhikhik :]
Info ;
~~~~~~
- Sebenarnya dengan melakukan sedikit modifikasi pd radio HT. Hasilnya akan lebih hebat dan luar biasa.
- – JANGAN MENGGUNAKANNYA UNTUK KEJAHATAN…!!!!!.



Source : http://sugoistanley.wordpress.com/

Jumat, 16 Maret 2012

Free Download cFosSpeed v6.50 + Crack - Software Mempercepat Koneksi Internet


March 17, 2012

Free Download cFosSpeed full CrackYaaa.. Selamat kembali pada perjumpaan kali ini hehehe
masih aja ada koneksi lemot? tenang saja menurut pengalaman ane selama ini saya masih memakai koneksi 128kbps tapi alhamdullillah koneksi tetap terjaga dan sampai skarang bisa menikmati internet dengan nyaman

langsung saja yaaaa,
ane kenalin nii software. sebenarnya udah banyak diluar sini sudah membahas software ini. tapi gapapalah kutip kembali disini hahaha

Namanya adalah cFosSpeed,
menurut situs aslinya mengklaim bahwa software ini sangat berjalan baik untuk me-manage bandwith dan menyeimbangkan keluar masuknya data (stabil).
menurut situs aslinya http://www.cfos.de :

"Internet Acceleration with Traffic Shaping and bandwidth management. Ping optimizer plus packet prioritization. Maximum Download and Minimum Ping. For DSL, ADSL, VDSL, Cable, Modem, ISDN, Mobile (GSM, GPRS, HSCSD, UMTS, HSDPA), Filesharing (P2P), Online Games, VoIP, Streaming Media and Tuning.
What's new in this version: Version 6.60 build 1852 has added support for Logitech G15 and G19 Gamer keyboards and fixed installation problems where cfosspeed.exe could not be overwritten"
software ini sangat kecil ukurannya
ane udah coba dan bekerja baik pada komputer OS XP sp3 32bit

untuk diingat :
  • Siapkan DVD installer OS XP (*untuk pengguna windows XP)
karena proses crack membutuhkan diatas untuk pengguna windows xp,
untuk pengguna windows vista dan seven tidak ada masalah :)

silahkan download disini :
http://adf.ly/1zH9K serve mediafire (4Mb)

crack download http://adf.ly/1zHC4 server Ziddu << klik
Selamat Mencoba ^_^.

Source : http://pedasmaniscinta.blogspot.com/

Rabu, 07 Maret 2012

Visa, MasterCard Plan to link Credit Card Purchases And Online Marketing



          If you thought it could not get worse with all the tracking and personalization on the Internet, then you have just been proven wrong. According to The Wall Street Journal and other sources, both Visa and MasterCard are planning to tie credit card purchases with personalized online advertisement. What does it mean? You recently bought a new BMW? Expect to see car insurance ads! You are a regular customer at Mc Donalds, Burger King or Kentucky Fried Chicken? Expect weight loss ads to dominate your ad experience on the Internet. Paid your membership to that online dating site with your credit card? See mail order bride ads.
Linking “real-world” purchases to online users is one of the holy grails of Internet marketing. Current advertising companies are already able to link online activity to advertisements. Linking offline purchases on the other hand would push behavioral targeting to another level.
visa online advertisement
Both credit card companies interestingly enough confirmed that they are exploring ways of using transactional data for targeted online advertisements. A Visa patent application in April for instance revealed plans to use personal details to create online profiles for ad targeting, with personal details taken from a variety of sources including “information from social network websites, information from credit bureaus, information from search engines, information about insurance claims, information from DNA databanks”.
A Master Card spokesman stated that the company “doesn’t collect card-holders’ names or contact information in transactions it processes”, and that it therefor “doesn’t connect an individual’s Web-surfing activity to their specific cardholder transaction data or provide outside companies with individuals’ transaction data”.
According to the Wall Street Journal article, both companies said that the plans are preliminary. Master Card and Visa are not the only two credit card processing companies that use the billions of credit card transactions for marketing. Most companies disclose in their privacy policies that they may share personal information with third party companies.
Master Card credit card holders can opt-opt of a variety of marketing and tracking related programs. This includes opting-out from the anonymization of personal information to perform data analyzes and from a unique web analytics cookie to avoid the aggregation and analysis of data collected.
The best way to protect yourself? Pay with cash whenever possible. What’s your take on this?

Source : http://www.ghacks.net

Rabu, 29 Februari 2012

Bypass Internet Censorship and Restrictions With Ultrasurf


29 February, 2012

If you ever have been to a country where Internet is heavily censored, you might have noticed that you cannot load some of the websites that you use to go to. Your only option in this case is to use a proxy or virtual private network to connect to the site.

Ultrasurf for Windows has been designed to circumvent Internet censorship. Once you have unpacked the program on your system you can start it right away to start using it immediately. The portable nature makes it ideal for situation where you cannot install software, in Internet cafes for instance.
Unlike virtual private networks that encrypt all of the PCs communication, UltraSurf concentrates on the web browser exclusively. It works with several web browsers out of the box, Microsoft’s Internet Explorer for instance or Firefox. The developer site still states that it only works in IE automatically, and that users of Firefox, Opera or Chrome need to change the local proxy in the browser to make use of UltraSurf. Firefox on the other hand worked fine on the test system without initial configuration.
Once you launch the application it is active right away. This is indicated with a golden lock in the lower right corner of the screen. You can right-click the lock to bring up a context menu leading to the program’s options
When you open the options you see two windows coming up. First the connection window highlighting the current connection and speed of that connection, and then the options window where changes to the program settings can be made.
ultrasurf
You can change the local listening port, automatic deletion of cookies and the history, or hotkey support in the options.
ultrasurf software
The connection speed is sufficient for light web surfing, but not for heavier use like streaming video or audio, or online gaming. It may sometimes be necessary to switch from one server to another if the connection speed drops to much. It is also important to note that the encrypted connection will only be available in the web browser, and not for other applications connecting to the web.
Ultrasurf uses a different approach than comparable applications such as GPass or Tor. That’s not necessarily a bad thing, but it may not be enough for users who would also like to use encryption when they retrieve their emails, use Skype or instant messengers.
Windows users can download the latest version of Ultrasurf from the developer website.
Enjoyed the article?: Then sign-up for our free newsletter or RSS feed to kick off your day with the latest technology news and tips, or share the article with your friends and contacts on Facebook or Twitter.

http://www.ghacks.net/

Rabu, 15 Februari 2012

Pemalu dan Kecanduan Internet akan Masuk Kategori Sakit Jiwa

February, 15 2012



Jakarta, Jutaan orang sehat, termasuk anak-anak pemalu, bandel, orang yang berduka akan kematian orang yang dikasihi dan orang yang sangat memuja sesuatu akan diberi label sakit jiwa. Demikian menurut panduan diagnosa gangguan mental yang baru.

Dalam analisis revisi panduan diagnosis gangguan mental yang menjadi acuan profesional kesehatan mental sedunia, Diagnostic and Statistical Manual of Mental Disorders (DSM), para psikolog, psikiater dan ahli kesehatan mental membahas tentang kategori gangguan mental baru yang dianggap konyol dan sangat mengkhawatirkan serta berbahaya.

Panduan yang selesai direvisi tahun depan ini bisa memberikan diagnosa medis bagi pemerkosa berantai dan penjahat seks dengan label 'paraphilic coercive disorder'. Akibatnya, sang pelaku bisa terbebas dari penjara karena ada alasan kesehatan atas perilakunya.

Lebih dari 11.000 profesional kesehatan telah mengisi petisi di situs dsm5-reform.com yang menyerukan untuk menghentikan pembuatan DSM edisi kelima.

DSM diterbitkan oleh American Psychiatric Association (APA). Isinya memuat deskripsi, gejala dan kriteria lain untuk mendiagnosa gangguan mental. Panduan ini digunakan secara internasional dan dipandang sebagai 'alkitab' diagnosis untuk mengatasi gangguan kesehatan mental.

"Revisi DSM yang diusulkan akan memperburuk masalah yang disebabkan karena mencoba menyesuaikan sistem. Ada beberapa diagnosis medis yang diberikan pada masalah yang tidak tepat jika dikelompokkan dalam klasifikasi," kata Peter Kinderman, psikolog klinis dan kepala Institute of Psychology di Liverpool University.

Kinderman mengatakan edisi baru yang dikenal sebagai DSM-5 ini akan menyebabkan munculnya diagnosis berbagai masalah yang seharusnya tidak pernah dianggap sebagai penyakit mental. Contohnya adalah gangguan pemalu, berduka, bandel dan kecanduan intenet.

Dalam DSM edisi sebelumnya, seseorang yang baru saja kehilangan orang yang dicintai dan memiliki suasana hati yang buruk dianggap normal karena sedang berkabung. Namun DSM edisi baru ini akan mengabaikan kriteria kematian dan hanya melihat gejalanya, kemudian memasukkan gejalanya dalam kategori penderita penyakit depresi.

"Banyak orang yang pemalu, berduka, eksentrik atau memiliki kehidupan romantis yang tidak biasa akan tiba-tiba dicap sakit jiwa. Ini tidak manusiawi, tidak ilmiah, dan tidak akan membantu memutuskan bantuan apa yang dibutuhkan seseorang," kata Kinderman seperti dilansir FoxNews, Jumat (10/2/2012).

Diagnosa baru lain yang dianggap bermasalah oleh para ahli adalah 'gangguan berjudi, gangguan kecanduan internet dan gangguan pemberontak oposisi', yaitu suatu kondisi di mana anak secara aktif menolak memenuhi permintaan mayoritas dan melakukan tindakan yang disengaja untuk mengganggu orang lain.

"Itu berarti anak-anak yang berkata 'tidak' kepada orangtuanya lebih dari jumlah tertentu akan masuk dalam kriteria tersebut. Dengan kriteria ini, banyak di antara kita yang akan mengatakan bahwa anak-anak kita sakit jiwa," kata Kinderman.

Sebagai dampak yang tidak diinginkan, Profesor Allen Frances, profesor Emeritus di Duke University dan ketua komite yang mengawasi revisi DSM edisi sebelumnya, mengkhawatirkan jutaan orang akan mendapatkan diagnosa dan perawatan yang tidak tepat.

Dana yang digunakan untuk pengobatan akan sia-sia sebab diberikan untuk orang yang tidak membutuhkan, bahkan mungkin bisa merugikan.

Source :

http://health.detik.com/

Rabu, 25 Januari 2012

Wikipedia Blackout: 11 Huge Sites Protest SOPA, PIPA On January 18

January 26, 2012



On January 18, over 7,000 websites -- including Wikipedia and Google -- will protest anti-piracy legislation currently making its way through Congress. Sites in opposition to the measures will either "going dark" or post information to educate visitors about bills H.R. 3261, the Stop Online Piracy Act (SOPA), and S. 968, the PROTECT IP Act (PIPA), two pieces of legislation meant to curb copyright infringement.

While many may support the bills' intentions, opponents and civil libertarians are worried that their passage would give the government powerful censorship tools that could threaten free speech.

When a site "goes dark," or participates in a "blackout," the site will in some way restrict its usual content. For example, the English-language version of Wikipedia, which will be dark from midnight January 18 until midnight January 19, will feature information about SOPA and PIPA and encourage visitors to contact their representatives, in place of its usual encyclopedia entries. Similarly, visitors to Imagur's photo gallery will find information about the legislation and "a message about how the PIPA/SOPA legislation threatens sites like Imgur" as well as "methods to take action," according to the company's blog.

At a speech in Boston last autumn, Eric Schmidt, Google's former CEO and now executive chairman, called SOPA "draconian," CNN reports. Google announced on Tuesday that it would be posting on its homepage a link to information about the proposed legislation, according to The New York Times.

In November, a bevy of large Internet companies, including Facebook, Google, Zynga, Twitter and LinkedIn, published an open letter in the New York Times that said, in part, the companies were "concerned that these measures pose a serious risk to our industry's continued track record of innovation and job-creation, as well as to our Nation's cybersecurity." AOL, which owns the Huffington Post, also signed the letter.

There are several ways you can get involved in the SOPA/PIPA protests. SopaStrike.com offers instructions on how to black out your own site. You can also let your voice be heard by clicking one of the links below.

Jumat, 20 Januari 2012

How Teleportation Will Work

January 21, 2012

Ever since the wheel was invented more than 5,000 years ago, people have been inventing new ways to travel faster from one point to another. The chariot, bicycle, automobile, airplane and rocket have all been invented to decrease the amount of time we spend getting to our desired destinations. Yet each of these forms of transportation share the same flaw: They require us to cross a physical distance, which can take anywhere from minutes to many hours depending on the starting and ending points.

But what if there were a way to get you from your home to the supermarket without having to use your car, or from your backyard to the International Space Station without having to board a spacecraft? There are scientists working right now on such a method of travel, combining properties of telecommunications and transportation to achieve a system called teleportation. In this article, you will learn about experiments that have actually achieved teleportation with photons, and how we might be able to use teleportation to travel anywhere, at anytime.

Teleportation involves dematerializing an object at one point, and sending the details of that object's precise atomic configuration to another location, where it will be reconstructed. What this means is that time and space could be eliminated from travel -- we could be transported to any location instantly, without actually crossing a physical distance.

Many of us were introduced to the idea of teleportation, and other futuristic technologies, by the short-lived Star Trek television series (1966-69) based on tales written by Gene Roddenberry. Viewers watched in amazement as Captain Kirk, Spock, Dr. McCoy and others beamed down to the planets they encountered on their journeys through the universe.

In 1993, the idea of teleportation moved out of the realm of science fiction and into the world of theoretical possibility. It was then that physicist Charles Bennett and a team of researchers at IBM confirmed that quantum teleportation was possible, but only if the original object being teleported was destroyed. This revelation, first announced by Bennett at an annual meeting of the American Physical Society in March 1993, was followed by a report on his findings in the March 29, 1993 issue of Physical Review Letters. Since that time, experiments using photons have proven that quantum teleportation is in fact possible.


Source :

http://science.howstuffworks.com/

Kamis, 19 Januari 2012

New Microsoft Security Essentials Public Beta Begins

January 19, 2012

Microsoft have begun issuing invitations to testers who expressed an interest in the next generation version of their Security Essentials, free anti-virus product.

In the invitation email the company say…

The Beta program is a fully functional antimalware app with ongoing updates to help protect your PC from viruses, spyware, and other malicious software. In addition to ongoing virus and spyware definition updates, we’ll provide software updates to the Beta for download through Microsoft Update on a periodic basis. To have these updates installed automatically, you must be subscribed to Microsoft Update with preferences set to Automatically download and install new updates.

This edition, version 4.0.1111.0 comes in both 64 bit and 32 bit versions and can upgrade a current Security Essentials installation automatically. The company also say that…

At the end of the Beta program, participants who are subscribed to automatic updates through Microsoft Update will be upgraded to the released version of Microsoft Security Essentials.

Which is news that will be welcomed by many people who simply don’t want to have to worry about it.

Microsoft have said that among improvements will be a much simplified interface, though on initial inspection it is very difficult to tell the difference between this and the previous version.

The new features are…

*
Enhanced protection through automatic malware remediation: The Beta program will clean highly impacting malware infections automatically, with no required user interaction.
*
Enhanced performance: The Beta includes many performance improvements to make sure your PC performance isn’t
compromised.
*
Simplified UI – Simplified UI makes Microsoft Security Essentials Beta easier to use.
*
New and improved protection engine: The updated engine offers enhanced detection with cleanup capabilities and better performance.

This software, which is based on the company’s Forefront anti-virus engine for enterprise customers, has been receiving some criticism in the last year for dropping down the ranking in anti-virus tests. This beta includes an improved scanning engine and Microsoft will be counting on this to put Security Essentials back in the top two or three for quarterly effectiveness surveys.

Microsoft Security Essentials is being built into Windows for the first time with Windows 8 and as such is bound to become a significant target itself. If people aren’t to install other third-party anti-virus software in Windows 8 they need to be reassured that Security Essentials, currently badged as Windows Defender in Windows 8, is a quality product that will protect them.

This inclusion into Windows 8 will make Security Essentials a target for malware writers who will try and undermine its effectiveness. The overall security features in Windows such as User Account Control will help minimise the surface for attack, but this must be high on Microsoft’s mind at the moment.

The download is 19.91Mb for both the versions (the 64-bit version is 11.04Mb and the 32-bit version is 8.87Mb) and runs on any version of Windows from XP with Service Pack 3 or later. The version you install must match the edition of Windows you are running, 32-bit or 64-bit.

The public beta is available through the Microsoft Connect website at connect.microsoft.com and I should stress it is just a beta, so should not be considered bug free and it might include vulnerabilities that leave your system vulnerable to malware and viruses.

Source :

http://www.ghacks.net/

Selasa, 10 Januari 2012

January Issue Now Available

January 10, 2012

Welcome to 2012! As you can tell from our fabulous cover, this month's postmortem is Eidos Montreal's well-received action-RPG, Deus Ex: Human Revolution. The team speaks about their experiences reviving the much-loved Deus Ex franchise, and how important forward-thinking and planning were to making the title a success.

Also, the 14th annual Front Line Award winners are announced! Our readers have voted these tools as the best in the business for 2011, and we've also ushered one special tool into our Hall of Fame.

Other features this issue include an open source solution for the back-end work needed for social games, by the makers of Creatures 4, and an interview in which editor-in-chief Brandon Sheffield and Gamasutra's features director Christian Nutt interviewed Kenji Kobayashi, the director of DeNa. The three discuss profitsharing and enhancing player ability through careful design and in-app purchases.

Our GDC 2012 Preview Guide is also included, which highlights some of the many talks that will be featured at the March event.

Source :

http://www.gdmag.com/

Minggu, 08 Januari 2012

Run Away From The CEH Certification

January 09, 2012

Sharp-eyed reader DigitalDolphin forwarded me snippets of an email thread on the CEH (Certified Ethical Hacker) certification from EC-Council or International Council of E-Commerce Consultants.

Chief,

You were dead on about the CEH cert. I think you mentioned it in SecurityMonkey Podcast #1 a while back.

Somebody on a security list recently did some research on these guys.

1) EC-Council or International Council of E-Commerce Consultants is a Nevada incorporated company and has NO office in New York as they claim. Pay them a visit and there is absolutely NOTHING there. Any enquiry called is always met with one response - please email. Try checking their claims before you invest in their products.

2) EC-Council had announced a university earlier this year at Wyoming. They claim the certifications would get credits for their masters program. In my opinion this is a diploma paper mill at best that will have its license revoked sooner or later as per the legislature revoking all unaccredited programs.

3) In checking their members list, it seems that most of them are fictitious or hardly involved. I don't think renaming the only program they sell is going to fool the government for long.

4) Check this link and compare it with this link - Its the same thing. What is the value for existing CEH if they are going to certify some of the candidates as CNDA? Oopsies. Everything is the same. There is no alteration. Its not just money here... If some of us are going to be CEH and some CNDA, wont one destroy the value of the other? They are out to squeeze every last drop of money they can - think about it... To do LPT, you must have attended training. Check their website here and see for yourself.

5) And the best for last! What do you get for your $2500US?

- Plaque with your name on it
- LPT License card
- Resource CD-ROMS
- LPT T-shirts
- LPT caps
- LPT Certificate
- LPT Lapel Pin
- Membership ID

6) Why dont we go to archive.org to the wayback machine (as shown in CEH course) and look at EC-Council's site. ECSA / ECSP/ ECAD / LPT / etc have been announced more than a year ago. Why are there no certifications coming out yet?

The funniest part is that nobody else claims LPT is prestigious - nor is there an industry demand or recognition. LPT will grant you the license (to do what???). Please mail them and ask what the license stands for?

Just food for thought! Love the blog and make more podcasts please! And tell Scrap he is a wanker!

DigitalDolphin

Wow. Well, that is certainly food for thought regarding the CEH program. Have any of you checked out the program? I've not been a big fan of the curriculum. Scrap actually went through the course and the only thing he really liked was the CDs that they handed out.

Wow - $2500 for CDs that are assembled from tool found on the net.

No thanks.

~ Chief.

Source :

http://it.toolbox.com/

Jumat, 06 Januari 2012

Play Settlers of Catan Online [Game Saturday]

January 06, 2012


Nothing beats playing board games with a couple of friends as it is usually lots of fun. Sometimes though you fancy a game but do not have enough friends or space available to play the game locally. That’s where online games come into play.
Settlers of Catan – original Die Siedler von Catan – is one of the most successful board games of all time. Players who are interested in playing Catan online can do so at Play Catan, the official Catan game portal on the Internet.
Registered users can play the core Catan game against the computer or human opponents. Core game in this regard means the original board game without any expansions. Paid account are available that enable access to expansions like Cities & Knights, Seafarers or Catan the card game, as well as tournaments and other games by the Catan designer Wolfgang Teuber.
The Catan board game can be played online on the Play Catan website, or offline in one of the game clients. Catan game clients are available for Windows, Linux and Mac operating systems.
The online client requires Oracle’s Java Runtime Environment. It is suggested to make sure that the latest version of Java is installed on the system to avoid issues with the game.
Free account players can only create and join basic online games. This is done in the channel browser. Only basic games are listed for free players here. You can join games with a click on an open game in the list and the selection of join from the controls at the bottom. Please note that you need to click on Start when you are ready.
play catan online
Games can be password protected which can be helpful if you want to play a friends only game. The game interface looks nice and clean.
settlers of catan
The game begins with the settlement placement phase. Each player places two settlements and two roads on the screen. Players who have played the board game before know what to do as it plays exactly the same. Let me quickly walk you through the rules of the game.
The goal of the basic game is to accumulate 10 victory points before anyone else does. You get victory points for settlements (1), towns (2), the longest road (2), the strongest force (2) and victory point cards that you can draw (1).
Each turn begins with the role of the dice. The number corresponds to numbers on the board. You get resources if you have settlements or towns adjacent to board regions with that number. Players who roll a seven can move the robber and draw a resource card from a player who has a settlement or town adjacent to it.
You get one resource type for each settlement and two for each town (unless the robber is placed on it). You can then use the resources to build or buy. You can build roads and settlements, upgrade settlements to towns or purchase cards. Cards benefit the player drawing them. They can give the player a hidden victory point right away, allow the player to build two roads when the card is played or move the robber around by playing a knight card.
The active player can trade resources with other players. This is one of the key elements of the game, especially during the early stages of the game when players do not get lots of resources due to a lack of settlements and towns.
Players can also trade resources with the bank. Four resources of a single type can be traded against any other resource. Towns at harbor locations reduce the trade ration to 3:1 or 2:1 for a particular resource.
And that’s the game. It is easy to learn and play once you get the hang of it.
Game strategy depends largely on the initial map setup and placement of first settlements. It is obviously beneficial to place the settlements next to three adjacent regions that yield resources. Probability plays a role as well, as certain numbers will statistically be rolled more often than others (lowest are 2 and 12 at both ends, highest resource wise are 6 and 8 which are indicated with a red color on the map).
Placement of settlements and roads can also prevent expansion of another player, as it is essentially possible to block a player this way.
Play Catan is a true to the original board game version of Settlers of Catan. Have you played Settlers before? If so, what’s your opinion?

Source :

http://www.ghacks.net/

Rabu, 04 Januari 2012

How to Pick a Lock

January 05, 2012

Locked out of your house in the middle of the night? Have you lost the key to the padlock on the shed? Before you pay a locksmith to let you in or to open something up, consider picking the lock yourself. Most locks around the home or office are simple pin-and-tumbler locks and can be relatively easy to open using a pick and tension wrench, both of which can be improvised from common household items. While the process is simple and can be mastered with practice, picking such a lock requires a great deal of patience. To pick locks, a person has to insert a thin metal pin or needle, moving the pin around until hearing a click or a gear shift. This article will show you how to pick a lock.

Steps

  • Understand how your lock works. The pin-and-tumbler lock consists of a cylinder that can rotate within its housing (see illustrations below). When locked, the cylinder is kept in place by several pairs of pins. The top pin of each pair protrudes into both the cylinder and the housing, thus preventing the cylinder from turning. When the correct key is inserted, it pushes the pairs of pins up so that the top pins no longer enter the cylinder. When this happens, the cylinder can be turned and the lock will open.     
                                                                                                                              

    Hilton Shopping Gallery

    Housing luxury brands & Fashion Located in Orchard Road, Singapore www.hiltonshoppinggallery.com  
    Note the five pairs of pins.
    • Note the five pairs of pins. The blue pins enter both the cylinder and the (green) housing around it, thus preventing the cylinder from turning. The springs provide resistance to keep the pins in place.
      • When the key is inserted, the grooves and ridges on the key push the pins up to the correct heights so that all the blue pins are completely out of the cylinder, thus allowing the cylinder to turn and the lock to open.      
      • Get a pick and tension wrench. Each pick is specialized for a different problem. A tension wrench, or torque wrench, is the device which you apply pressure with to turn the lock cylinder. Professional-grade picks and tension wrenches can be purchased in sets (see picture), but many lock picking hobbyists make good quality sets of their own. See the Things You'll Need section below for information on how to make your own picks and tension wrenches. 



      • Place the tension wrench into the lower portion of the keyhole.
      • Determine which way the cylinder must be turned to unlock the lock. If you commonly use the lock, you probably already know which way you turn the key to open the lock. If you don’t know, use the tension wrench to apply torque to the cylinder, first clockwise and then counterclockwise. The cylinder will only turn a fraction of an inch before it stops. Try to feel the firmness of the stop. If you turn the cylinder the wrong way, the stop should feel very firm and stiff. If you turn it the right way, there should be a bit more give. Some locks, especially among padlocks, will open regardless of which way the cylinder is turned.
      • Apply light torque to the tension wrench in the correct direction, and hold. The required torque will vary from lock to lock and from pin to pin, so this may require some trial and error. Start gently, though.
      • Insert the pick into the upper part of the keyhole and feel the pins. With the pick in the keyhole, you should be able to press up and feel the individual pins with the tip of the pick. You should be able to push them up and feel them spring back down when you release the pressure. Try to push each one all the way up. Identify which one is the hardest to push up. If they are all very easy to push up, turn your tension wrench more to increase the torque. If one won’t go up at all, ease the torque until you can push it up. Alternately, you may wish to “rake” the pins before this step (see Tips below).
        • Push the stubborn pin up until it “sets.” Press the stubborn pin with just enough pressure to overcome the downward pressure of the spring. Remember, the pin is actually a pair of pins. Your pick is pushing against the lower pin, which in turn pushes against the upper pin. Your goal is to push the upper pin completely out of the cylinder. Then, when you stop pushing, the lower pin will fall back down into the cylinder, but the torque on the cylinder will result in a misalignment of the hole in the cylinder with the hole in the housing, and the upper pin should then rest on the cylinder without falling back down. You should hear a faint click as the upper pin falls back down on top of the cylinder. You should also be able to push the lower pin up a little with no resistance from the spring when this occurs you most likely have the upper pin “set.”
        • Continue applying torque and repeat the last two steps for each of the remaining pins. It is imperative that you maintain torque on the cylinder to prevent the set pins from dropping back down. You may need to make slight increases or decreases in torque for each pin.