Wednesday, June 18, 2008

10 Langkah Mudah Ngecrack WPA

Dalam Video Di Tunjukkan Menggunakan Distro Whax(one Of My favour)

Tuesday, June 17, 2008

DIVShare Got Hacked last night

I receive this this email from divshare:


Thanks for being a part of DivShare. Late last night we were alerted of a security breach that allowed a malicious user to access our database, which included user e-mail addresses and other basic profile information. No financial information has been accessed by any unauthorized parties. We have taken extreme measures to secure the site in the last 24 hours and are currently in the process of rolling out new security precautions, which is why many files were unavailable earlier today. We apologize for this inconvenience and for the oversights that allowed this security breach to take place. We take the security of all data and files very seriously and are embarrassed and regretful that an intrusion was allowed to take place on our watch.

Please rest assured that no financial information whatsoever has been compromised. While we are not aware of what data has actually been accessed or copied, the database included user e-mail addresses and other data you may have saved to your profile, such as your first name. We are not aware of any files being accessed without permission, but we recommend that you change your account password and the passwords on any private folders as a security precaution.
We can’t apologize enough for allowing this breach to take place. We know how important security is for all our members and their files, and we are taking every precaution available to ensure that this doesn’t happen again. We ask for your patience as we roll out new security upgrades in the coming days, and we pledge to keep your files and user information under the tightest security possible from here on out.
Please don’t hesitate to contact us at support@divshare.com with any questions or concerns.


You see what i mean? so change your pass now, if you are one of divshare member and use same pass for another account.


Firefox aims for download record

So far Mozilla has not said exactly when on 17 June the attempt to break the record will begin. Firefox first appeared in early 2004 and since then has steadily eroded Microsoft's hold on the web browsing world.

"There is actually no record for the greatest amount of software downloaded in one day, so for 24 hours from the moment we push the bits live, that's when the countdown starts," he said.
Mr Kim said Mozilla had no specific target for the number of downloads it would like to achieve on the day but racking up five million would be "awesome".
By comparison, Firefox 2.0 registered 1.6 million downloads on the day it was made available on 24 October, 2006. More than 1.3 million people have pledged to download the new version on 17 June.

WEB BROWSER STATS
  1. Internet Explorer - 83.27%
  2. Firefox - 13.76%
  3. Apple Safari - 2.18%
  4. Opera - 0.55%
  5. Netscape - 0.14%
Source: OneStat



Friday, June 13, 2008

Domain cost

You can register a .com domain name with several very reputable registrars for, say, $6.99/yr to $9.99/yr. Fees for registering the other possibilities, .info, .co.uk, .net, .org, .biz, .tv can range from $0.99 per year to whatever the registering company wants to charge.

But is it going to be worth it? And where do you stop with the combinations? .com, .co.uk, .info and then there's the 'do I add a dash ( - ) just-to-be-on-the-safe-side.com, .org, .biz' ? I would say, probably not. The .com brand is so widely known that most people will automatically type in a .com extension on any website they are trying to find.


Private Registration

This option will keep your private details, name, physical address and email address unavailable to anyone checking the ownership of your domain on "Whois". Internet law requires that all information about domain registration be publicly available and "Whois" maintains the databases that hold this information.

If you buy a private registration, your details will not be available to just anyone who wants to check your domain for specific ownership. There are many domain owners who don't think this is necessary but, on the other hand, private registration can help you avoid spam, crank emails and unwanted phone calls.

It is worth bearing in mind that any emails you send from the US that are commercial in nature, like:

i) Promoting a product or affiliation
ii) Suggesting that the reader visit your sales page
iii) Offering a discount for purchasing some product

are required, by the US Can-Spam Act, to have your correct, physical mailing address visible to your email recipients and the correct email address you sent the advertisement from, so this kind of defeats the object of private registration in some ways.

Protected Registration

This form of domain registration protects you from inadvertent expiration of your domain registration, including credit card expiration, failed billing or outdated contact information. It also makes it more difficult to accomplish most malicious domain transfers by Internet predators. Effectively, your domain would be held for you until you renewed the registration.

It can cost more than $25 a year for this service, depending on who you are using for this protection. If you are a small marketing venture, selling a piece of software, an affiliate product or an ebook on a niche product, you may not need this upsell. However, if later your domain starts making lots of money, and you decide that you do need it, you can easily add it.

Business Registration

This level of domain registration keeps need-to-know information about your business in the Whois database. That information can include a map to your store, website photo, business description, phone number and links to vital pages of your website.

The vital information your customers might need to facilitate business deals with your business is visible to millions of searchers in the Whois domain name database.

Do you need it? That would depend on the nature and size of your business and your budget. This would be more of a marketing/budget decision. A small, start-up website selling one ebook would probably not need this additional service.

Buying expired domains

Creating a special brand for your business always involves spending a huge amount of money in active advertising and promotion. Further, advertizing a web portal to build a special brand around it is a time consuming task that demands hours of dedicated work. If you do not have these resources with you, you can always try and buy expired domain names that are capable of providing a corporate brand to the business. You can always create brand awareness, by choosing and buying an expired domain name that really carries and conveys the issue of what is the web portal all about and what it gives to its visitors.
Let us say that you have found a series of niche keywords on parenting keyword. Now, if you want to buy some expired domain names based on this special keyword, you will need to ensure that the chosen keyword can convey a distinctive and special corporate branding ability.
The selected expired domain name should not only have a good searching placement in many major search engines, it should also be memorable and easily recalled. To establish branding with the selected expired domain name, you may consider the following salient points:

a) Choosing a keyword that relates to everyday experience and feelings could be an intelligent thing. For example, BabyFeeding or BabyHealth can instantly create a good rapport between a mother and her child.

b) Choosing a keyword like MasterDegree will appeal to all those studious people, who wish to pursue their master degrees. Here, the selected keyword connects the inbuilt feelings of people with that of the expired domain name.

c) A keyword that is easily searchable is better than the one that is almost impossible to remember and search. For example, a keyword like MyFavoriteSoup is quite inferior to MySoup.

Establishing a brand and a corporate identity over your chosen expired domain is very difficult and time consuming. However, with careful planning and by applying your intelligence mind, you can buy an expired domain that will allow you to create a special brand and niche web portal.

Yahoo and his New partner: GOOGLE

Yahoo!'s efforts to revive takeover talks with Microsoft Corp. have reached a dead end, prompting the Internet pioneer to hire online search leader Google Inc. to handle some of its advertising sales.Yahoo! is trying to fend off a shareholder mutiny led by activist investor Carl Icahn, who has vowed to replace the company's board because of the way the directors handled the Microsoft negotiations.But Icahn has been hoping to engineer a sale to Microsoft, so some shareholders may be reluctant to support his attempted coup unless he can demonstrate that his slate of directors has a better turnaround plan than the current board.Icahn did not return phone calls seeking comment Thursday. The fate of Yahoo's board is to be determined at the company's August 1 annual meeting.
The news disclosed Thursday caused Yahoo! shares to plunge 10 percent as investors abandoned hope that Microsoft would renew a nearly five-month quest to buy the Sunnyvale, California-based company.

Thursday, June 12, 2008

World Cyber Games 2008 Begin


On 11 Juni 2008, The biggest competition will Begin At Jakarta Convention Center, with the PT. Telkomsel dan Samsung as the main sponcore, The winner will be send to the singapore on august. They wil playing game DoTA All Stars, HALO 3, Guitar Hero 3, Virtua Fighter 5, Need for Speed: Pro Street, dan FIFA 2008.
So are u interset?

Find A Proxy For Facebook

The number of web proxies is everyday increasing and more and more are being setup to earn revenues through advertisements. To search for proxies for websites like Facebook, you can use the search engines like Yahoo or Google. There are a number of websites offering these services and you can choose any of them as per your requirement. These proxies are Youtube and Facebook compatible and you can access any blocked site which is blocked by your school, university or company.

Proxies allow you to surf the internet with a high level of privacy, security and anonymity. When you access a website from the proxy server site, information like your browser type, location, operating system and IP address is eliminated and the proxy server website is recorded as the accessing computer instead of your computer. This helps you maintain the privacy, security and anonymity you desire, as it facilitates web browsing without your information being identified and bypasses the network filters and firewalls.
When you use a proxy server, your computer establishes connection with the proxy instead of the destination website, and thus the blocking or filtering firewall will be able to trace this connection only. Further this proxy server, which may be transparent or anonymous, will create a connection to the desired URL which you want to access such as Facebook.com, and retrieve that website, eliminating any trace of your computer.
The proxies allow users to browse through the Facebook website, profiles, post comments, blogs and surf the site for music. Sometimes, you may be required to use the IP address of the proxy (i.e. http://222.12.1.1), instead of the domain name, which can be retrieved by pinging the URL from command prompt.The process is very simple and convenient. You are not required to install or download any software to browse the blocked sites. All you have to do is type the desired URL (for example: www.facebook.com) on the main page and all connections and traffic to and from the destination URL is redirected via the proxy, making it look as if the traffic is evolving from the main proxy, thus bypassing the domain based URL filtering blocking system.
These proxies allow you to access any website without revealing your personal information, surf, download games and news, access online social networking websites and shopping sites, share videos, music, chat and a lot more.

Online Business is this safe?

You might think that your internet business is safer than it actually is. Because we often can't see or tell that someone is trying to hack into our systems - until it's too late - it's easy to be blissfully ignorant and assume that everything is okay. That's why it pays to sit down and analyze your whole business to see how well protected it really is.

The steps you can take vary from the most basic to the more advanced, which you will probably need help to achieve. Make sure you have the right anti-virus and anti-spyware software in place to protect you and perform your updates and scans on a regular basis. Make sure you have a secure firewall as well, since this will also help protect your data. If you employ a lot of people it is wise to make sure they are aware of the need to protect the business in every possible way. Don't assume that everyone knows what to do because not everyone does. It only takes one person opening an infected attachment on an email to cause havoc and lose you business as a result.

There is something of an assumption that hackers are only after personal information, but that isn't always the case. Some businesses have been the victim of hackers who have used their systems to distribute spam emails by the thousands, for example. If this happened to you, you can bet it would effectively shut down your website until the problem was sorted. Pure Hacking helps protect your Internet security by providing world-class penetration testing and ethical hacking risk management services. For a free consultation, please visit Penetration Testing.



Tuesday, June 10, 2008

The New Route to an American War with Iran

Although American attempts to convince US and world opinion of active Iranian involvement in attacks on American forces in Iraq have scarcely been more successful than the Bush administration's constant refrain about Iran's nuclear threat, some incident, real or contrived, may occur which will be used by Bush and Cheney to justify air strikes on Iran.

Initially, limited air attacks on Iranian military targets may not prove to be unpopular in the United States. Outsiders rarely grasp that hostility to Iran's revolutionary Islamic government is almost as deep-seated in many parts of the United States as hatred of the American 'Great Satan' is among much of the Iranian people. This is hardly surprising given that the Islamic Republic of Iran is the only country in the world which has humiliated not one but two US presidents: Jimmy Carter over the Tehran hostages crisis in 1979-81 and Ronald Reagan in the Iran-Contra affair of 1986-7.

Even many Congressional Democrats would no doubt be ready to support limited air strikes on Iran if the Iranians could be plausibly linked to incidents in Iraq in which American personnel had been killed. Whatever their reservations about the Iraq war, both Democratic presidential contenders, Hillary Clinton and Barack Obama, have been noticeably bellicose in their comments about Iran.

Once air attacks on Iranian military targets have begun, they would no doubt become a regular occurrence. American and world opinion would quickly become used to them, familiarity soon blunting initial outrage in most quarters. Like the intermittent Anglo-American air campaign against Saddam Hussein's Iraq during the 1990s, the air strikes on Iran would eventually seem unremarkable. Even Operation Desert Fox in December 1998, a series of major air attacks on Iraq in retaliation for Saddam Hussein's expulsion of UN weapons inspectors, excited only limited international indignation.

Not only would people become used to air attacks on Iran, lessening likely hostile reaction to a shift to nuclear targets, but the attacks themselves would prepare the way for later strikes on nuclear sites by steadily destroying Iranian defences. Anti-aircraft batteries, radar systems, and command and control facilities would have to be destroyed to ensure the safety of US aircraft hitting IRGC 'terrorist bases' however 'limited' the initial air strikes were said to be.

Once Iranian defences have been sufficiently degraded and diplomatic attempts to curb Iran's nuclear ambitions have failed, as they probably will, the Bush administration can easily switch to attacking Iranian nuclear sites in the knowledge that such attacks will provoke a much reduced level of international outrage.

Although most scenarios see the excuse for US air attacks on Iran as being an incident in Iraq involving the deaths of US ground personnel caused by Iranian weapons and/or forces, a maritime incident might have advantages for the United States. The most feared Iranian retaliation in the event of an American attack on the country is an attack on tanker traffic in the Strait of Hormuz which would send world oil prices rocketing into the stratosphere.

If a maritime incident set off hostilities between the United States and Iran, American naval forces in the Gulf could immediately seek to repeat their success in Operation Praying Mantis back in April 1988. On that occasion US forces crushed Iranian naval power in less than twenty-four hours.

Most large surface units of Iran's navy are obsolete, but in recent years Iran obtained three Kilo class diesel attack submarines from Russia. US naval commanders have expressed concern about the threat posed by these vessels to Gulf shipping and they will no doubt welcome the opportunity to destroy them as soon as possible.

Of course the Iranians have so far done their best to avoid provoking the Americans. The arrest of the British naval boarding party in March was a local IRGC initiative and the incident was soon brought to a close by the Tehran government before the Americans could exploit their ally's difficulty as an excuse for war. If a suitable incident does not arise soon, Bush and Cheney may have to create one to justify their planned attack on Iran. Perhaps US naval vessels will be sent into Iranian territorial waters in the hope of provoking a violent response. This was what was done in the Gulf of Tonkin in 1964 and resulted in the famous 'incident' which led to full American participation in the Vietnam War. Will the American Congress and people fall for the same trick a second time?

Getting SSH Proxy to Work Under Vista

Download putty first. Then created the Dynamic Port Entry like so:



and grabbed a copy of FoxyProxy for Firefox so that your proxies do the right thing on demand. All is well, except you're constantly getting "Empty return from Server" or "The proxy server is refusing connections", and now you're starting to really think hard about installing XP. (Granted, you probably should, but let's assume that's not an option.)

Well, turns out that Vista is again being "helpful". (i have a long standing hatred of things that are "helpful" because they usually just get in the way. While this can be cathartic when driving steam rollers, it's often less so when you're working on software.)

First, the proxies. Chances are VERY good that this is enough to get you going: You need to use 127.0.0.1 as your localhost address rather than localhost.

This is because Vista "helpfully" configures IP6 above IP4. (IP6's version of "localhost" is "::1:", but i'm pretty sure that putty will choke on that.)

Change your Proxy Host Name and things should work just fine.

If not, you'll need to punch a hole through your local firewall for that port. (thanks to The Great FB who provided that tip). To do that, you'll need to go to your Control Panel (seriously, switch to classic view. You're not an idiot.), Windows Firewall, then click on the Allow a program through Windows Firewall on the left side. (this will bring up the Settings/Exceptions tab) and [Add port...] Name: Proxy ; Port number: 1080 (or whatever port you're using) ; (*) TCP ;[OK]

That got me online and hopefully you too.

Wi-Fi Hacking (NEW) Tool

Wi-Fi hackers have gotten more advanced and your private information is even more at risk. The recent Black Hat conference in Las Vegas featured a demonstration by Errata Security that detailed how a hacker can use new tools to steal your encrypted cookies and passwords and then control your online sessions.

Errata has combated this new hack threat with their own tools, Hamster and Ferret, which prevent attacks. It appears that the good guys are following closely behind the bad guys but they’re still slightly behind and all Wi-Fi users need to be careful.

Online Casino Sites

According to popular casino reviews sections, another recent trend is on its way to become a decisive factor in the classification of the best-ranking online casinos. Statistics show that this trend is getting momentum now and is currently spiraling.

Namely, the tendency is that female players on top online casinos comprise a substantial part of all online casino players. Besides, the point is that female players have been claiming their intention to be a factor on classy online gaming sites. Encouraged by the lower costs of broadband internet and greater access, women players are acknowledged to continuously spend more time online, respectively more time gambling than men. In tune with this current trend, online casinos are adapting to cater for the growing demographics of female players.

Top online casinos are becoming regular at providing attractive bonuses and campaigns like weekly Ladies Nights promotions. All of these offer huge prizes to attract women players focusing on particular games craps, video poker, roulette.

Casino reviews reveal that women are frequenting mainly casino sites which offer social networking. Having in mind the idea of bringing more women players to their sites, many of the top online casinos have developed Ladies Only forums.
Many of these online casino sites have even established educational portals where they have placed information which helps the new players to learn all about how to play online. Statistics shows that these best-ranking online gambling sites are regularly bringing out new attractions to draw players by putting forward high-value prizes, free games and different kinds of competitions.

Sunday, June 8, 2008

Wireless Networks Are Everywhere

Where can you find the wireless networks, or electronic “highways,” to connect all of your devices? The answer is simple: everywhere. Wireless networks are an increasingly ubiquitous part of our existence.Satellite networks blanket the entire globe, touching just about everywhere that people live, and most places that they don’t (excepting only the North and South Poles). Closer to earth, terrestrial (ground-based) networks of all sorts cover homes, buildings, cities, and even wider areas. Wireless networks let you stay in contact, online, connected, entertained, and informed, no matter where you go.

Sunday, June 1, 2008

Spyware is one of the biggest threats

Spyware is one of the biggest threats to your privacy and the security of your data. It's also the number one cause of system slowdowns on computers because it uses precious system resources including RAM (memory) and hard drive space. Some Symptoms of Spyware, Adware, Malware Infection: The symptoms of a malware infection vary.
Spyware is one of the biggest threats to your privacy and the security of your data. It's also the number one cause of system slowdowns on computers because it uses precious system resources including RAM (memory) and hard drive space.

Malicious software may also shut down or disable your anti-virus program or your firewall program. It may prevent the normal activity of your anti-Spyware software. It may prevent you from accessing Task Manager or msconfig or regedit.
Adware programs may create new icons on the Windows desktop, task bar, or system tray. They may also create popup windows that you are unable to close. If your computer mysteriously dials the phone on its own, it may be infected with a porn dialing program.