Comparison of Galaxy S III vs iPhone 4S vs HTC One X

The battle in the mobile market is sure to be a class above the more intense after the presence of Samsung Galaxy S III.

Samsung Officially Launches Galaxy S III

After a long wait, finally Samsung officially unveils Galaxy S III. Android's latest generation of South Korean vendor will soon be visited Europe and Asia followed this by the end of May 2012.

New Nokia Photo Samples from 808 PureView, Wow

For those of you who are interested to buy Nokia 808 Pureview, it's good to see the first images captured using a camera phone. This time the sample photos of the 41MP camera has been obtained through Nokia's official Flickr account.

Samsung: Planning for Windows Phone 8 Smartphone with Base Galaxy S III?

Windows Phone 8 is still not officially announced, but rumors about the smartphone vendors who are making phones with the operating system in it keeps popping up. WP-Life.com this time claiming that they heard the initial details about plans for a product Samsung Windows Phone 8.

6 Expected Features Available on the iPad Mini

Re hot news comes from a family line of iPad. Apple rumored to be making a new tablet with a 7 inch size with a price tag in the range of USD 200. This was done to compete with the Kindle Fire.

Showing posts with label Secrurity. Show all posts
Showing posts with label Secrurity. Show all posts

Beware of Attacks Ramnit Computer Virus

After some horrendous virus like Stuxnet, Sality, Virut and Shortcut, there are now Ramnit that is equally sophisticated. This malicious program is able to 'cooperate' with other viruses to infect the victim.

Yes that's the uniqueness Ramnit compared with other viruses. After infect the victim computer, these malicious programs will download variants of other viruses.

And even more confusing, the type of virus that you download will be different for each target computer either from the name and size. This is what causes many antivirus programs although difficult to perform detection and cleaning.

Based on information received from Vaksincom detikINET, Tuesday (01/02/2011), this virus not only spreads via the Internet, but also through other media such as flash by using the Autorun function.

Another action that will be done by this virus is injected exe files that have extensions, etc. and htm / html file either an application program or Windows file system. Each file is injected will increase in size about 107-109 KB

Protect Company Data for Risk Anticipation

The protection of data and corporate assets is considered very important in anticipating the risk. For that, we need a reliable replacement facilities at the corporate data center to crash or malfunction that may interfere with the course of business. 

Facilities replacement or back-up from the data center known as the Disaster Recovery Center (DRC). According to Bayu Adi Pramod Data Center Product Manager PT Aplikanusa Lintasarta, build DRC directly or in-outsource both have advantages and disadvantages. 


"It depends on each company's outlook," Bayu said in a written statement received detikINET, Thursday (01/27/2011).
It's just to outsource the DRC, he continued, the company can focus on core business and more importantly able to reduce capital expenditure (capex) became operational expenditures (OPEX).
Lintasarta himself had participated in the 'Data Center Conference & Expo Series 2011'. This activity was held by the Data Center Strategics (Pacific & Strategic Group) in several countries in Asia Pacific and Europe. 


In the conference discussed some of the content among other IT Services & Data Center Data Center Infrastructure. In this event Lintasarta will focus on IT Services Data Center, featuring a Business Continuity Plan, Cloud Computing, Virtualization (server and DC), Managed Services, Networks & Design, Business Continuity and Application. 


Bayu said, BCP is very important applied by national companies that are ready to go further and focus on their core business. 


BCP or Business Continuity Plan is a planning and coordination to identify measures to minimize risk, mitigate disruption / disaster and the process of post-disaster recovery operations for its operating costs to run smoothly. 


BCP itself consists of 4 main sections namely Business Impact Analysis (analysis of business functions are critical to disaster), Continuity Requirements Analysis (continued analysis of the needs of business functions), Risk Assessment (evaluation of business risk) & Risk Mitigation Plan (a plan to anticipate the risk)

Beware of Fake Antivirus via Goo.gl on Twitter

Popularity of a website will automatically attract cyber criminals to took aim. Similarly, Twitter and its users, not escape from the target spreaders of malware and viruses.

Graham Cluley of Sophos explained, the virus is transmitted through a short URL goo.gl. Users were led to open links a fake antivirus application which actually is a virus itself.

"Thousands tweeps found their accounts to post links that contain malicious programs without their permission. This indicates an attack from fake anti-virus," Cluley said as quoted from PC World, on Tuesday (01/25/2011).

Mentioned Cluley, malicious program attacks delivered through the link using the short URL is not something new. Short URL service like bit.ly goo.gl and Twitter users often used because it can cut the number of character tweet.

This is a field of interest to cyber criminals to use in spreading malware or viruses. Moreover, with the large number of Twitter users, will be very profitable for them to get the victim in large quantities once the shutter.

5 Threat of Cyber 2010, which is still Dangerous

Various emerging cyber threats occur throughout 2010, some of which even involve big companies like Google and Facebook. Here are five threat cited by Admin from PC World, on Tuesday (28/12/2010).

Threats via Google Street View

Google service called Street View, it was also claimed to have a crack that could be exploited by crackers. That said, the data in and out through the application does not properly encrypted, so opened up opportunities for theft of mail and password.

Attacks 'Lamb of Fire'

Using a public Wi-fi is not encrypted into one of the things that warrant concern. The reason is, there is a special add-ons for Firefox called Firesheep which allows access through a data theft hotspots.

Mobile Malware

Malware attacks on smart phones are increasingly vicious and should be wary. Even according to Kaspersky, the Russian losses due to malware reach USD 500 thousand per month throughout 2010.

Reconnaissance on Facebook
No doubt if many virtual dedemit who try to attack the users of Facebook, one of them with how to create applications that draw on social networking sites are the most famous.

In addition to the application, data leakage via up also can occur through advertising. When a user clicks on an ad, could be automatically sends a unique web link id which contain detailed information such as religion, gender, hobbies, and more.

Location-Based Services

Location-based services such as Facebook Places, Foursquare, and Gowalla allows users informed of their existence and activities have been carried out. Beware, this allows one to keep track of where you are secretly

5 Cyber Security Trends in 2011

In fact, cyber crime is very attractive to criminals. With the growth of mobile services platform superb, criminals will have more ways to attack.

Then would like  about cyber security trends in 2011? Here are 5 predictions according to Symantec:

1. Important Infrasturuktur So Target Attack, Slow Reacting Government

The attackers seemed to have seen the impact of the threats that attack Stuxnet in industrial control systems industry. Symantec estimates that cyber criminals take a lesson from what Stuxnet.

This is the most significant example to date in terms of a computer virus created specially to change the behavior of the system hardware to produce a physical effect in the real world. Although initially slow, it is estimated the frequency of this type of attack will increase.

The findings of the 2010 Critical Information Infrastructure Protection (CIP) Survey Symantec also menggaungkan this trend because 48% of respondents said they expect to get an attack in the next year and 80% believe that the frequency of such attacks will increase.

"Most of the critical infrastructure providers to give support and really hope to be able to cooperate with their governments in planning for CIP. However, we would not expect much movement on the government side related matters referred to in this year," says Symantec.


2. Zero-Day Vulnerability and Target Very Special

In 2010, Hydraq aka Aurora, provide concrete examples of the target class with a very specific threat that is growing. The threat was trying to infiltrate into a particular organization or a particular type of computer systems by exploiting software vulnerabilities that were previously unknown.

Attackers have used this security hole for years, but when the threat to the very specific target gained momentum in 2011. Symantec predicts, users will see zero-day vulnerabilities appear more in the next 12 months than in the previous year.

The main drivers behind this trend is the nature of the low distribution of malware. Threat with specific targets to focus only on a small number of organizations or individuals in order to steal valuable data or infiltration / access the target system.

By exploiting this fact, the attacker intends to increase their madness and attack their targets in a single attack without being noticed.

3. New IT Security Model

The use of smartphones and tablet continues to grow at a pace that is unprecedented. IDC estimates that by the end of the year, shipments of new mobile devices will increase by 55% and Gartner meproyeksikan that in the same time, 1.2 billion people will use mobile phone with a rich web connectivity capabilities.

When the devices become more sophisticated while only a small portion of mobile platforms that dominate the market, it is inevitable that the attacker will enter the mobile devices in 2011 and that mobile devices will become the main source of loss of confidential data.

Therefore, the spread of this gadget is not showing signs of decline in the years to come, companies will be attracted by the new security model to protect data that is stored and can be accessed through the device.

Moreover, when employees become more mobile and work when you travel, the company also had to overcome various challenges associated with adopting new models, such as security in the cloud, for appropriate solutions that will work seamlessly on many platforms and devices .

4. Triggering Encryption Technology

Explosion in the use of mobile devices in the corporate environment does not only mean that the company will face new challenges in keeping the device and critical data in it easily accessible and safe. But they also must comply with various industry data protection regulations of data protection and privacy.

Despite these regulations, many companies / organizations do not disclose when the device moves that contains important data is lost, as they did with the laptop.

"In fact, employees do not always report the loss of these devices into their company. This year, we predict that regulators will begin to take action against this problem and this will encourage companies / organizations to further enhance the use of encryption technology, especially for mobile devices," Symantec said.

The company is also believed to be a more proactive approach to data protection by adopting encryption technology to meet the standards of compliance with regulations and avoid heavy fines and damage to their brand which is caused by a data breach.

5. Attacks Triggered Political Interests

In the study CIP Symantec, more than half of all companies said they suspect or reasonably believe that they have launched an attack with a specific political purpose.

Previously, these attacks particularly in the area of cyber espionage or attack type of denial-of-service to the Web service. However, with the opening of Pandora's box because Stuxnet, it seems we will see these threats move more than just a game of espionage and interference, because the malware is armed to cause damage in the real world.

Symantec assumes that Stuxnet probably only the first tangible indication of death from the efforts that some people call it a 'cyber war' that has been occurring for some time now.

"In 2011, indications that more clear about the efforts to control the digital arms race which is currently ongoing will come to the surface," added Symantec

7 Tips for Keeping Passwords

Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.
 

1. Not Using Default Password 

The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.
Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.


2. Not Using Password Hint 


Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.
Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the penebak password.


3.
No Writing  Password 

Owners are often afraid to forget your password with the password has been entered, so the owner would write different passwords user id and password into other media such as a notebook, notepad, Stickies (mac), password folders, books, mobile phones and other.
It is also quite vulnerable to leaking. Why vulnerable? Because when a variety of equipment is lost, then all information about a user id and password are sooner or later will be known by the thief equipments / gadgets are missing.


4. Using a Strong Password 


Owner passwords often using a short password only, if it could be shorter than 3 characters then the user will give a short password. Fortunately this time the system provides a minimum password length of 6 characters and a maximum of 254 characters. The longer a password the stronger it will be the password security.
Strong passwords can be created with a combination of numbers and letters and even a variety of other characters. Some admins are currently using a password that is long enough, coupled with encryption such as PGP key and others, so it is quite difficult to guess password.


5. Frequent Change Password


 Owners should periodically change your password for authentication password, the more frequent password changes, the better, because the more difficult the penebak password hacking account / your system. Changes to the password depends on the owner, could be a week, a month, three months, and others. Originally the owner does not forget the password that was changed earlier.

6. Not Wearing The Same Password on Multiple Accounts 


Owners often forget and sometimes passwords frequently enough to create an account, so they each create a new account using the same user id and password are the same, this is very vulnerable and dangerous. Because these passwords through a single account, all accounts will be taken by the hacker.

7. Using Password Management 


To help recall the various passwords and various accounts, we are often very difficult, but not to worry because it has many current applications to help organize our passwords. This application can be downloaded for free from the internet and paid, so that regardless of our account and whatever we can with the password easy to remember and re-opened, of course, to open it with an encryption method as well.

Remove Vexira Safely and Completely from Windows

Is Vexira not the right fit for you now and you are finding ways out to uninstall it? Are you driven mad when you fail to remove all the annoying traces of Vexira which rib you off a perfect computer experience? What you should take into consideration is that you need to remove all Vexira's now-defunct registry entries and related files completely, or it will cause various computer errors and have negative effect on the other programs on your computer. How the hell can you safely and completely remove Vexira from your computer?
How to uninstall Vexira from Windows through common method Applying for Add/ Remove Program tab on the Control Panel is the most common-used and conventional way to uninstall Vexira by many computer users. Generally, you can take the following steps through this method:
1. Exit Vexira 2. Click Start, click Control Panel tab. 3. Find out Add/Remove Programs applet in Windows XP or Windows 2000, and then Click Uninstall a Program in Windows Vista. 4. Click the Change or Remove Programs button on the top of the left list. 5. Scroll down the list and highlight Vexira, then click Remove to uninstall in Windows XP or Windows 2000; Click Uninstall in Windows Vista. 6. Click Yes when you are prompted to reboot the computer.
Up to here, the removal of Vexira has not finished yet since there are some folders and items related to Vexira are still left on the computer, which will lead to many troubles to you. Therefore, it is very important for you to take either the following measures to completely uninstall Vexira:
1. Go to drive C -> Program Files, find out Vexira and then delete all the related files directly from the computer. 2. Click Start -> Run, put in Regedit in the search box, click Enter to get access to the registry. Delete all the related keys of the program.
Is it so complicated and troublesome for you to follow so many steps to uninstall Vexira? If you are not computer-educated, all those are risky for you because if you have deleted the wrong file, your computer will suffer from even more serious problem. Even worse, Vexira you want to delete is not listed on Control Panel. What can we do in these cases? Don't worry about it. It is just a piece of cake if you have a reliable uninstaller on your PC.
Easily and automatically remove Vexira from your computer An uninstaller named Perfect Uninstaller is really a professional, award-winning, advanced uninstall tool that can ensure you to 100% get rid of any unneeded programs with great easy and make sure all the now-defunct registry entries and related files are eliminated automatically with a few clicks. What you need to do is just to take several steps below:
1.Download and install Perfect Uninstaller. 2. Run the uninstaller. 3. Highlight Vexira in Display Name list and then click Uninstall. 4. Follow the removal instructions. It is so easy, right? Why don't you have a look at the uninstaller? Visit: Perfect Uninstaller.

Computers and Internet threats!

Computers are now a common thing. Every day, you may be associated with this object. Computers and the Internet has helped many of your work. Ease of finding information, perform various financial transactions, store or process data into something that is not too burdensome. But behind its simplicity, there are many threats that can destroy data or your computer either a PC or laptop.

When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you're working, you may conclude your computer a virus. Actually there are various threats that target when you work with computers and the Internet. These threats can damage data, computers, and even steal important data.
Security threat is not just a virus. Maybe there are some terms you've ever heard but still do not know what he meant. Here's an explanation of the things that can threaten your computer or take your important data.


 Adware
This is a program that will display ads on the computer. It would be disturbing because adware generally will use the resources of the computer, as a result computer is running slow. There is also a type of adware that appear in pop-ups that can interfere when you're working.

 
Brute Force
An activity to break the password by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it's good password that is used not only consist of numbers and letters but also consists of symbols like $, #, &, and others.

 
DDoS
Is a continuation of a Distributed Denial of Service, where a server or computer is attacked with bombarded shipment data in a very large size of many computers simultaneously. As a result the computer is difficult to access or damage to hardware not being able to accommodate very large data items.

 
Exploit
That is an application that tries to find and attack the weaknesses of the system to gain access to or for the purpose of infecting the system or computer.

 
Fake Antivirus
The way it works is by making as if a computer virus and suggest to buy anti-virus to overcome the virus.

 
Hoax
That is plain hoax spread through email or website. The effect is a panic or a lot of readers who were deceived. Another result is burdensome because of the Internet network of hoax chain messages are delivered to another person.

 
Keylogger
It is one threat that is dangerous. Keylogger will record that entered through the keyboard input to be stored or sent to someone who normally used for purposes that are not good. This is in particular to watch out for when you enter the password in public places like cafes. Password that you entered via the keyboard can be known and may be used for purposes that are not good.
One way to avoid a keylogger is to use On Screen Keyboard now must enter the password. On Screen Keyboard can be run from the Windows programs that are on Programs | Accessories | Accessbility or by typing in "OSK" from Start | Run on Windows Operating System.

 
Malware
Usually found on the bootsector on the disk, then change the course of the first run. Systems that are usually affected first is the Operating System. Infections in Operating System makes it easier malware to spread themselves or spread the virus on storage media such as CD ROM or Flash Disk.

 
Phishing
Is a form of fraud on the internet by making someone would provide important information that is not entitled to know. For example, by creating a website similar to a bank website. A victim does not realize he had been deceived and then enter the password that setealh known by the manufacturer can be used to deplete savings victim.

 
Rootkit
That is a program that aims to hide other programs running. Usually used to spread malware, virus, or keylogger.

 
Spam
Mean an unexpected email. Usually an email advertisement or a teaser for a person visiting a particular website which is actually a phishing or to disseminate malware. Messages can be sent in large quantities, so spend time to remove them.

 
Spyware
Is a program that works to spy on users with the purpose of obtaining critical information such as credit card numbers, PINs or passwords that can harm the victim because the leaking of such information.

 
Trojan
Acting as if he dalah good program that can be used to help users work. But, actually in it there are functions that endanger the overall system or to steal confidential information. Trojans easily spread to other computers.

 
Worm
Is malware that can multiply and then sends copies itself over a network without having a specific activity performed by users. The worm can be dangerous because it can become an entry point for viruses, malware or other destructive programs.

Microsoft: Do not Press the F1 Currently Browsing

Microsoft found a weakness in software. In order to prevent this vulnerability exploited, the Redmond giant was also recommends users not to press F1 while browsing the web.
As quoted from Microsoft Security Advisory, Wednesday (3/3/2010), a weakness has been discovered in VBScript. Strictly speaking, this weakness will affect computer running Windows XP and Internet Explorer browser (IE).
This weakness could be exploited when a user presses the F1 key. Buttons are usually used to call the help function (Help menu) in Windows applications.
"If a malicious site displays the Dialog Box specially made and the user presses F1, a malicious code can run on a user's computer in accordance with the authority of the user," according to a warning from Microsoft.
Well, Microsoft offered a few ways to prevent this weakness to attack your computer:

    
* Do not press F1 when prompted by a particular site
    
* Turn off access to the Windows Help
    
* Change the rules of the IE security to 'High' to block ActiveX
    
* Set IE for giving warnings when trying to run ActiveX

Once again, this vulnerability affects computers running Internet Explorer on Microsoft Windows XP operating system. User's operating system or software other browsers will not be affected.

Download Google Chrome 7.0 Offline Installer

After last month has released Google Chrome Chrome 6.0, this time one browser it has released the latest version of Google Chrome 7.0 Stable. In the 6.0 version of Google Chrome did a lot of changes to the side of the interface (interface), as in the Address bar no longer displays the http:// at the website address and the loss of bookmarks button in the address bar.
As I quoted from the Google Blog Chrome, the Google Chrome 7.0 is more focused on a few bug fixes. Also, added also support for AppleScript in Mac OS X to implement HTML 5. Similarly, block site feature, the Google Chrome 7.0, you can block sites by using a dialog box.
To try out Google's new Chrome you can update Google Chrome directly from the browser (see How to Update Google Chrome) or to download Google Chrome Offline Installer 7.0 and install it offline.


Download Chrome Offline Installer 7.0

Prevent Users Delete or Uninstall Programs

way that the user can not remove or uninstall the program. Indeed, sometimes on a computer that is used by more than one user, where all users have administrator rights, the uninstall program could happen. Perhaps because of factors due to deliberate or mis accident. Moreover, the removed program is a very important program and coincidentally also the installer is not there anymore. It must be hard again to get the program. Then how do I prevent it?
There is a tips for for the program can not be deleted or be uninstalled by the uninstaller to block executable files from the program. Executable files from the uninstaller is usually named uninstall.exe, uninstall.msi, unwise.exe, uninst.exe and some other programs can be different.How do I know the file the uninstaller of a program?


There are several ways to find files of a program uninstaller that is:The first way is by looking at the program folder located at C: / Program Files / NAME OF PROGRAM / (assuming your Windows is on drive C: /).


The second way is by looking through the Windows Registry that is the path:

HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/NAMA PROGRAM/

(Replace NAME OF PROGRAM with the name of the program that you want to see uninstallernya).Then on the right side look at the value named UninstallString. That the location and file name uninstallernya. Examples for the program Digsby, I see the path:

HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/Digsby/

Then it is UninstallString C: / Program Files / Digsby / uninstall.exe. Means his name is Uninstall.exe uninstaller file that is located in the folder C: / Program Files / Digsby.




Uninstaller file name of a program you already know the two steps above. Next we proceed to block executable files for the program uninstaller earlier can not be deleted or uninstalled. Still the same way by blocking the program in Windows that I've posted previously. Here are the steps to prevent that the user can not remove the program or prevent the uninstall program:

   
1. Click Start »Run. Type gpedit.msc and press Enter to open the Group Policy Editor
   
2. In the Group Policy Editor window click the User Configuration »Administrative Templates» System.


3. On the right side double click (double click) the item named Do not run specified Windows Applications.




4. In the window Do not run specified Windows Applications Settings that appears click the Enabled option and click the Show button.

5. Then, in the Show Contents window that appears, enter the name of the executable installer from programs that do not want deleted by another user. For example, the program name is Digsby as I mentioned above. Uninstaller file name is Uninstall.exe. Then, type "uninstall.exe" in the list.

6. If you want to include the uninstaller program to another, first look at the file name uninstallernya with how to view the file uninstaller above. If the same file name, you do not have to enter it again. If the file name is not the same, then you must memasukkanya again.
   
7. If all the uninstaller file name you have entered, click the OK button to save. Then click the OK button is also on the window Do not run specified Windows Applications previous settings and close the Group Policy Editor.
Everything has been done up to here. Now try to uninstall a program that you have entered in the list. Does the uninstall process can be done? If it does not mean all of them successful. If not, check whether the name of the uninstaller files you've typed correctly.