Information systems

  • Beranda
  • Blogging
    • Template
    • Blogging
  • Downloads
    • Software
    • Game
  • Blogging
  • Template
  • SSH Gratis
Home → Semua Post

reflections of life

Add Comment
08.33
No one is perfect. Those who want to learn from mistakes is wise.Sad to see people insist that they are right even if proven wrong ...When we fill our hearts with repentance for past and fears for the future, we do not have today to acknowledge. An open mind and a closed mouth, is a combination of happiness. The more you talk about yourself, the more possibilities for you to lie. If you can not be smart, be a good person. Jealousy is shown to someone will injure themselves. You can only live once in this world, but if you live right, once is enough. Fond memories of the past only to be remembered, not to be remembered. Fear is not to be enjoyed, but to deal with. Wise people always complement her life with a lot of friendships. Open our eyes wide open before marriage, and let our eyes half closed after health like a true friendship, we became aware of value after we lose friends with people who like to defend the truth. He is happy and we dikala ornate shield at a time when we are hard, but we will never have a friend, if we expect someone with no errors. Because all humans are good if we could see the goodness and fun if we could see the uniqueness, but all men would be bad and boring if we can not see them. Semulia-noble man is who has the manners, shall humble themselves as noble, forgiving when powerless to retaliate and be just as strong. Indeed there are some words that are harder than stone, sharper than a needle prick, more bitter than jadam and hotter than the coals.Truly the heart is a field, then tanamkanlah it with a good word because if it does not grow all of them (an unkind word) necessarily grow partially. No deposit is more useful than a science. Nothing is more fortunate than adab. There is no better friend than reason. There is no unseen object is closer than death.Hopefully useful Salam brotherhood fillah

virus function

Add Comment
02.14

Virus Recovery Tips



Why is a computer virus harmful? For the same basic reason that biological viruses are: they damage components that keep systems healthy.

Some are relatively benign - they generate annoying, juvenile messages or crash the system once, then go away. But many are specifically designed to do substantial harm - by deleting files needed to run word processing programs or perform essential operating system tasks. Some prepare the way for further attacks by opening up access to administrative functions.

Combating them is simple - install antivirus software, keep it up-to-date and running in the background and don't open email attachments from unknown sources.

Nonetheless, odds are high that someday the system will be infected. Important data will be lost, essential program and operating system files will be zapped. Now what?

First thing: Don't panic. You may not even be infected. Before implementing a cure you have to diagnose properly.

If the system is still functional and you have access to the Internet, search for current, known viruses. Scan your system manually and search the file system for virus programs or infected files. Search memory too - sometimes the little creeps hide there.

Test multiple programs and operating system functions. It may be that something just went wrong with one component. Not a fool-proof method, the virus may have just attacked those specific ones.

If the system isn't functional, boot the system using an antivirus diskette or CD. You did prepare one, right? No? Er, go back to Step 0 - pre-attack - and (1) prepare bootable antivirus diskettes and a CD, (2) create CD copies of software purchased and/or organize the originals, and (3) backup important data.

Scan the system after booting from diskette or CD and look for the virus or infected files. You really are infected? Ok, on to the next phase.

If you're running Windows select the boot option: Last Known Good Configuration. It rarely helps, but sometimes you'll get lucky, and if you've re-booted twice you've lost the opportunity.

If you're running Windows, check for existence and the dates of key operating system files. (The list is too long to display here. Search Microsoft's web site for 'Operating System files', or make a list from the Windows (or WINNT) directory and System (or System32) sub-directory, of another computer. For the same service pack level, the dates should match other files, for the most part. 

Check especially kernel32.exe and lsass.exe. Hackers like to go after those two. Fixes from Microsoft update some, but they tend to come in bunches. Just one with a different date is suspect. Yes, no one said this was going to be easy. Windows is to some extent self-protecting and self-healing but far from perfect. Replace those files with good ones, if needed.

Again for Windows users, it may be the Registry that's corrupted. There are several useful tools available to fix it. Just search on Windows Registry repair utilities and choose one suitable for your version. Any recommendation made here will be out-of-date in six months, but forums are full of helpful up-to-date opinions.

If the problem is only a program - word processing software, or email client or browser, for example - de-install and re-install. Annoying, but usually pretty straight forward, and most programs won't delete any user created data files without prompting you first.

In the worst case scenario - lost user data not backed up somewhere (oops, you skipped Step 0) - several commericial Data Recovery services are available that can sometimes get it back. They tend to be expensive, but your data may be worth it. It sounds like magic, but they often can recover at least some even though you've searched thoroughly and the data appears lost.

what is spam

Add Comment
02.09
What Is Spam?


Almost anyone with a passing acquaintance with the Internet is familiar with spam. Just as junk mail is the demon of the Postal Service, spam is the scourge of e-mail.

Spam is unsolicited e-mail - often with some alleged commercial purpose, but almost always unwelcome. It's sent in bulk by automated programs to millions of e-mail addresses, usually offering products and services such as prescription medicines, get-rich-quick schemes and pornography.

As much as the objectionable content, it's the method of sending spam that upsets most people. Unlike junk (snail) mail that's delivered by the Postal Service at the expense of the sender, the cost of sending spam lies almost entirely on the receiver and the transmitters. There is a cost to the sender, when they use paid services to distribute, but the charge is often minimal.

So, why is spam so hated? After all, it can be eliminated with a simple delete. While receiving one or two unwanted e-mails a day is a minor inconvenience, when the number rises to 10, 20, or a hundred per day it becomes a major problem.

Before e-mail became an accepted means of communication, spam was mostly limited to USENET - newsgroups established to discuss specific topics. As it advanced, mechanisms for cross-posting - sending one message across multiple groups - came widely into use.

The ability to cross-post was, regrettably, quickly exploited by spammers. The same message could be sent to thousands of newsgroups with no regard for their actual interests.

With the rise in popularity of e-mail, spammers gained a whole new arena in which to inflict harm. They use software (spambots) to collect e-mail addresses posted on web sites or newsgroups, and send out their unwanted messages to millions of recipients at once.

Spambots are programs used to harvest e-mails for subsequent compiling into lists in order to - you guessed it - spam large groups of individuals in one easy and ill-bred way.

The sheer number of messages sent makes spam profitable. This is known as 'shotgun' advertising - when it's advertising at all and not a scam. Most reputable advertisers use 'targeted' marketing, which involves soliciting e-mail addresses voluntarily - or at least attempting to analyze the recipient - to send only messages that are likely to be welcomed.

Most people won't fall for get-rich-quick schemes or be interested in random merchandise solicitations, but if even one recipient out of a million provides his or her credit card number, the spammer's efforts can be amply repaid.

But don't despair. Spam is being fought on several fronts simultaneously. Companies and trade groups, legislation and technology are combining forces to make spam a thing of the past.

The effort may never be 100% effective since one man's spam is sometimes another's welcomed offer for a hotly sought item. But large strides are being made in all three areas.

In the interim, an individual needn't wait passively for others to solve the problem. We look at some tips on how to reduce spam and hinder spambots in later articles.

virus hoaxes

Add Comment
02.05
Virus Hoaxes, As Bad As The Real Thing?


computer viruses cause real damage to systems or lead to data theft. The consequences are lost time, broken programs and sometimes real money stolen.

A hoax can have these same consequences.

A virus hoax is typically distributed by e-mail to 'warn' recipients of a new threat to computer systems security. After detailing how this new virus is a serious threat, the e-mail advises you to forward the message to everyone you know. This 'chain letter' effect causes one kind of real harm.

Virus hoaxes can circulate widely. Suppose a recipient distributes it to 10 people and each of those 10 people distribute it to 10 more people, and so on down the line. After only six generations, one million bogus e-mail messages will circulate throughout the Internet. By the seventh generation the number reaches 10 million, and by the eighth generation - 100 million e-mail messages that serve no purpose are clogging up networks worldwide.

This effect can cause servers or routers (specialized computers that route Internet traffic) to slow down or even crash.

Often such hoaxes are forwarded with good intentions. A classic example is the e-mail warning about a virus called 'Deeyenda', circulating since 1995. It claims a virus called Deeyenda is circulating via e-mail. The e-mail explains the FCC (Federal Communications Commission) has issued warnings about this virus, and advises the recipient to pass the message on.

Everything about the warning is false. Viruses can't be activated by reading a text e-mail and the FCC doesn't issue warnings about viruses. (Spyware, yes. But then it's not usually a warning, but the annoucement of a criminal indictment.) Furthermore, there has never been a virus called Deeyenda.

Even a hoax can do real system damage. Some warn the user to delete certain files allegedly containing the virus. Such files are typically (unknown to the average user, of course) critical to proper computer operation. Deleting them may have no immediate effect - until the system is re-booted and fails to start.

How to Combat Virus Hoaxes

Fighting a hoax starts with 'recognizing the enemy'.

One clue that a warning is bogus is the use of technical jargon. The 'Good Times' virus hoax contained this warning: 'If the program is not stopped, the computer's processor will be placed in an nth-complexity infinite binary loop which can severely damage the processor.' This sounds very impressive, but in fact there is no such thing as an nth-complexity infinite binary loop. Also, no processor can be harmed by excessive use. Your system may be too busy to process desired commands, but no actual harm is done to the hardware.

Virus hoaxes often contain references to real organizations such as the FCC or a company specializing in antivirus software. If the warning is real, it'll be easy to verify on these organizations' web sites. If the virus warning is real, you can expect to find references to it in print, on television, as well as all over the Internet.

It should go without saying, though some have fallen prey, one should never 'buy' from someone unknown proposing to 'cure' your virus infection. There are many legitimate antivirus vendors - some offer downloadable products, others provide a service over the Internet. But all can be verified by reviews in trade publications and valid testimonials from trusted sources.

trojan horse virus

Add Comment
02.02
Trojan Horse Viruses, Not A Myth


Most people are familiar with the legend of the Trojan horse. During the siege of Troy, the Greeks left a large wooden horse outside the gates, allegedly as a peace offering. The Trojans brought the horse inside the city walls only to discover it was full of Greek soldiers who quickly sacked the city.

A computer Trojan horse is similar. It looks like a benign or useful program but actually contains hidden code that can destroy data or install spyware.

A Trojan horse is often referred to as a virus, but unlike a true computer virus doesn't replicate itself. It's simply designed to gain access to your system and wreak havoc - like the mythical Greek soldiers.

Many Trojan horses (or simply 'Trojans') are spyware, used to monitor your computer activity and send information to a third party without your knowledge or consent.

Spyware can be used to deliver unsolicited pop-up ads, or to log private information such as credit card numbers and passwords, or even reroute your browser to a commercial site. The unscrupulous vendor at that site usually paid the spyware creator to do just that.

Another common use for a Trojan is to install a 'backdoor' - an access point to your computer which bypasses the normal login procedure. Hackers use backdoors to gain control of your computer to send spam or to wreak malicious damage. Since the damage appears to originate from your system it can be hard to combat.

Geeks make a distinction between 'crackers' who gain access to a system to do harm, and 'hackers' who just want to understand the details of how a system works. We'll stick with the more common, though less accurate, term.

How Trojans Are Distributed

Trojans are hidden in programs which appear useful. You visit a free utility site, download one and run the program. Your system is infected.

They can also be spread by e-mail attachments. If the attachment contains an executable file, that program can also contain a Trojan which will infect your computer as soon as it is run.

Executable files have extensions such as .exe but sometimes the extensions are hidden to make the file look like a harmless text file. An example of this would be a file named 'look_at_me.txt.exe. The user may not notice the '.exe' part of the filename (the extension) and think it's a text file. Some operating systems allow users to hide extensions, so in this case the user would simply see 'look_at_me.txt'. 

Newer tactics involve embedding them in certain image files. The lesson is: never open a file from someone unknown, or when its arrival is unexpected. Even well-meaning individuals pass on viruses this way.

It's common for Trojans to be spread through operating system vulnerabilities. An operating system controls the basic functions of the computer. Computers connect to the Internet through 'ports', some of which present security risks. Malware takes advantage of these vulnerabilities.

One well-known Trojan is called Sub7. Some claim it has legitimate uses (such as remotely controlling your own computer), though it's often used for illegal activities. Computers with Sub7 installed are accessible from a remote location and can be used to steal credit card numbers by logging keystrokes for example.

Fighting Trojans - The modern way

Most antivirus software will detect and remove Trojans. Keep your virus database up to date to provide the best protection. Some antivirus programs require you to manually scan attachments or other incoming files. Get one that does it automatically. The cost difference is negligible.

Always use caution when opening email attachments, even if they come from a known source. If the attachment is unexpected it should be suspected.

Firewalls should also be used to close vulnerabilities when using the Internet.

worm virus

Add Comment
01.59
Worm Viruses, Deadliest Of All



Of the three most common types of malware (malware is short for malicious software, i.e. designed to harm) - viruses, Trojans and worms - the latter is the most harmful because only worms can function without human intervention. 

Worms, like viruses, replicate themselves but unlike viruses are completely self-contained. Viruses need a 'host program' to spread, but worms propagate independently.

Though they can be designed to do the same kind of harm (file deletion, program corruption, etc), worms usually affect networks. Networks operate by means of servers and routers. The Internet is just a large set of mutually cooperating public computer networks.

Servers are similar to PC's, though usually faster and with more storage and other resources. They 'serve' other systems by making those resources available to multiple users. Routers are just specialized servers, typically of different hardware and operating systems, used to route network traffic. Hence the name.

Worms can be released into a network and their self-replication behavior causes damage. Since routers use memory, processor time, etc worms - like viruses - can overwhelm them, causing them to slow down and become unstable. Viruses don't have to delete files to do harm, they can cause the CPU - central processing unit, used to run programs - to be constantly busy. That leaves no resources for other programs to run.

Worms often carry 'payloads' - other types of malware such as spyware or backdoor installation programs. Spyware is used to monitor your computer activities and backdoors are hidden access points to your computer which can be exploited by hackers to send spam or steal data from your computer.

The fastest spreading worm ever was 'MyDoom'. First released in January 2004, it was distributed by e-mail and contained the message "andy; I'm just doing my job, nothing personal, sorry."

The author was never been discovered, but many believe it was designed to attack software company SCO (Santa Cruz Operation). Programmed to flood SCO's web site with Internet traffic, it quickly spread to the Internet at large causing a world-wide slowdown.

For individual computer users, the worm's payload is the biggest threat. Payloads can be designed to work around computer security by turning off antivirus functions or opening up computer ports. Ports are used by network software to move data in and out. Once done, the computer is open to data theft or malicious acts such as deleting files.

De-Worming

Firewalls are moderately effective in protecting your computer against worms. They can be set up to restrict network traffic and can help to 'cloak' your computer. If your computer can't be 'seen' it can't be infected with worms which spread over networks.

However, worms are also distributed in e-mail attachments so use caution when opening mail from unknown recipients or when someone known sends unexpected files.

Despite your best precautions, your system may become infected. You may notice your computer acting sluggish or rebooting on its own. Internet access may become very slow.

If you suspect your computer is infected with a worm, scan your system with antivirus software. If it fails to remove the worm, instructions for manual removal can be found on the Internet.

fight virues

Add Comment
01.56
Two simple precautions can help keep your computer virus free - install and use software from reliable vendors and avoid opening unexpected e-mail attachments.
Almost all e-mail attachments are potential virus carriers. Some of the most famous viruses were distributed by accessing address books of infected computers and sending e-mail (with attachments) to everyone in the address book.

Even those from known senders should be regarded with suspicion - e-mail addresses can easily be faked to appear to be from someone you know.

The 'Melissa' virus that appeared in 1999, originally posted on an Internet newsgroup, was distributed in a Microsoft Word document. When downloaded and opened the virus accessed the user's address book and sent copies of the document (along with the virus) to the first 50 people in the user's address book.

Every computer that received the virus sent out an additional 50 copies, creating a worldwide slowdown in Internet networks. The effect took only a few hours.

Another widespread virus distributed by e-mail was the 'ILOVEYOU' virus of 2000. When double clicked it sent copies of itself to every e-mail address in the infected computers address book. But far from a problem of the past, viruses are still very much with us.

What to do?

ANTIVIRUS SOFTWARE 

Antivirus software is available in both commercial and freeware versions with a variety of features and prices, usually from free to less than $50.

Most antivirus software works by examining files as they arrive at the computer and by scanning later at configurable pre-set times. The programs work by examining each e-mail attachment and downloaded file looking for virus 'signatures'.

If a virus is found the user will be alerted and infected programs and attachments can be cleansed of the virus or, if not possible, infected files can be deleted or placed into 'quarantine' where they can't be run.

UPDATES

Whare are signatures? All programs have instructions in a pattern. Computer viruses - like their biological counterparts - come in known, though evolving, patterns. The fact of evolution is the reason virus-checking files need to be regularly updated. Updated files contain lists and the characteristics of new signatures.

Most antivirus software can be configured to alert you when the virus checking files are out of date, and even to automatically refresh signature files with the latest versions.

USER PARTICIPATION

Users can become complacent after installing antivirus software, thinking they're totally protected and don't need to worry about becoming infected.

Apart from the fact that antivirus software is written by humans, who can make errors, vendors can only react to viruses after they're created. By that time, much damage can already have been done. An e-mail attachment or program may be infected with a new type of virus that your software cannot (yet) detect.

Some antivirus software can - to a limited extent - detect virus activity even without being able to identify a particular virus. This is an extra level of protection against the latest viruses, but still shouldn't allow users to become overconfident. 

Always use trusted sources for downloading software and treat every e-mail attachment with caution.

OTHER INFECTION ROUTES

Lastly, a special note about CDs and DVDs. While they can't be written to (those that can are called CD-R's, DVD-R/W or some variation), they can still contain viruses. Users who burn their own CDs or DVDs - inexpensive and easy these days - can accidentally copy infected programs onto the disc. Since CDs can contain files that automatically act when the disc is inserted, it's possible - though rare - for viruses to be spread without additional user action.

Once again, the lesson is clear. Only accept material from those you know and trust, and who practice 'safe file sharing'.

Be safe out there, now.
Postingan Lebih Baru
Postingan Lama
Beranda
Langganan: Postingan (Atom)
  • Beranda
  • Sitemap
  • cara aktivasi windows vista

Translate

gampang banget cari duit disini Buruan... Daftar!!!

Entri Populer

  • get the rank these day
  • How To Password-Protect Documents
  • building adsense website
  • cara agar skripsi tugas akhir tidak ditolak sama dosen
  • safe mode fixer
  • Free SEO keyword analyzer tool
  • Cara Bikin Background Di Flash Disk
  • manual car repair
  • Windows 7 Start Button Changer 2.6
  • my computer is attack

Label

  • android (2)
  • Bengkel Windows (24)
  • Cari dolar tanpa modal (1)
  • Cari duit di blog (17)
  • Free Seo (20)
  • GPS (17)
  • Information (18)
  • Lowongan Kerja (11)
  • obat (2)
  • Smartfren Tips Trik (12)
  • Software (52)
  • Tips And Trick (43)

Arsip Blog

  • ▼  2014 (1)
    • ▼  Oktober (1)
      • cara mendapatkan pulsa gratis
  • ►  2013 (13)
    • ►  Mei (1)
    • ►  April (1)
    • ►  Maret (5)
    • ►  Februari (6)
  • ►  2012 (66)
    • ►  November (1)
    • ►  Juli (2)
    • ►  Juni (27)
    • ►  Mei (15)
    • ►  April (6)
    • ►  Maret (7)
    • ►  Februari (3)
    • ►  Januari (5)
  • ►  2011 (215)
    • ►  Desember (47)
    • ►  November (23)
    • ►  Oktober (2)
    • ►  September (2)
    • ►  Agustus (28)
    • ►  Juli (55)
    • ►  Juni (13)
    • ►  Mei (16)
    • ►  April (2)
    • ►  Maret (2)
    • ►  Februari (18)
    • ►  Januari (7)
  • ►  2010 (54)
    • ►  Desember (19)
    • ►  November (15)
    • ►  Juni (8)
    • ►  April (2)
    • ►  Februari (5)
    • ►  Januari (5)
  • ►  2009 (10)
    • ►  November (10)

Tags

Copyright 2014 Information systems
Template By Ridwan Hex And Game Gratis