Dollar Ziddu

Translate

Kurs Mata Uang

Senin, 30 April 2012

History of Hackers


The term hacker was born about the year 1959 from MIT (Massacusetts Institute of Technology), an American university that consists of intelligent people but tend not to trust in God (atheist). It was then that all started, of a new room, "EAM room" in Building 26 at MIT, a place which is the ancestor of the "new world" What we know today, where the ancestors of a machine which we now refer to as "computer", the machine that can take us to kelebihbaikan with freedom of information, the world of the true Hacker.
The Hacker always cooperate voluntarily resolve problems and build things. They always share information, give answers and racing to do their best to respect the environment.They never stop learning to be an expert and very anti to do something repetitive and boring. They are guided by the words of wisdom: "To follow the path - look at the experts - to follow the experts - to walk with the master - the master-be recognize the expert"
Meanwhile, the cracker busy to satisfy themselves with Cracking activity. ranging from breaking into your computer, spread the virus (without a purpose - there are some real hackers to write viruses, but with a clear purpose), to outsmart the phone (Phreaking).The Hacker referred to them as lazy people who are not responsible. So, it is not fair if we still think that hackers are evil and scary as it is very clear that Hacker Cracker is constructive while unpacking.
Want to become a Hacker? There is no hard words for those who want to learn. To be a hacker you have to master several languages ​​and of course the attitudes that can make you welcome in their neighborhood. Usually, candidates start by learning the language Hacker [Python] because this language is the easiest programming languages ​​belong.Discussion of these languages ​​can you look at www.python.org. After that you also have to master [java] a little more difficult but it produces faster code than Python, [C], [C + +] at the heart of UNIX, and [Perl] (www.perl.com) and [LISP ] for the details.
After mastering all the basic capabilities above, candidates are advised to open Hacker sati open-source version of UNIX or LINUX study, read the code, modify and run it again. If you're having trouble, it is advisable to communicate with the Linux user club [www.linpeople.org]
Attractive side of a Hacker is where they go hand in hand in solving a problem and build something. But unfortunately, the lives of those who spend 90% of their time to activities Hacking is not a good thing. If you really want to be a Hacker, be a good hacker ...
Levels Hacker In The World
Elite:
Also known as 3l33t, 3l337, 31 337, or a combination of it; is spearheading the network security industry. They understand sistemoperasi outside in, able to configure and connect a global network. Capable of programming each day. A very natural gift, they are usually efficient and skilled, to use his knowledge to the right. They're like stealth to enter the system without the know, although they will not destroy data. Because they always follow the rules.
Semi Elite:
Hackers are usually more mudadaripada Elite.Mereka also have the ability and extensive knowledge of computers. They understand the operating system (including holes). Usually equipped with a number of kecilprogram enough to change the program exploits. Many published attacks by hackers this caliber, the Elite unfortunately they are often categorized Lamer.
Developed Kiddie:
This title terutamakarena this young age group (ABG) and still in school. They read about the method of hacking and how on various occasions. They tried a variety of systems to ultimately succeed and proclaim victory for those still using the Graph lainnya.Umumnya UserInterface (GUI) and just learn the basic of Unix, without being able to find a new hole in the operating system weaknesses.
Script Kiddie:
As developed kiddie, Script Kiddie usually do the activity above. As well as Lamers, they only have technical knowledge of networking is very minimal. Usually can not be separated from the GUI. Hacking carried out using a trojan to scare and lived most troublesome Internet users.
Lamer:
They are people without experience and knowledge who want to be a Hacker (Hacker wanna-be). They usually read or heard of Hacker & wanted to like it. Use of their computers mainly to play games, IRC, exchange prirate software, steal credit card.Usually done using a software hacking trojan, DoS nuke. Usually brag on IRC channel etc.. Because many shortcomings to achieve the elite, in their development will only be up to the level of developed or script kiddie kiddie course.

source : 
spyrozone
source : adsense-id?
source : 4.bp.blogspot

Selasa, 17 April 2012

Facebook Rapikan Alamat Email Pengguna

KOMPAS.com - Facebook selama ini telah menyediakan opsi untuk memiliki profil dengan nama khusus dan email. Meski, mungkin tidak semua user mengaktifkan opsi itu. 

Kini, Facebook telah mengumumkan bahwa nama pengguna untuk alamat profil  dan alamat email itu akan dibuat konsisten. 

Contohnya, pengguna dengan alamat profil facebook.com/markzuckerberg akan memiliki email markzuckerberg@facebook.com. 

Hal ini tidak berlaku bagi mereka yang sudah mengaktifkan alamat email facebook.com mereka sebelum peraturan baru ini diumumkan. 

Untuk memiliki username yang akan digunakan untuk profil dan alamat email, pengguna bisa mengakses: "https://www.facebook.com/username/".

Alamat email "@facebook.com" itu bisa menerima pesan dari layanan email apapun. Untuk membaca dan membalasnya, pengguna bisa memanfaatkan fitur Messages di Facebook. 

Untuk mengaktifkan fitur email "@facebook.com", pengguna bisa mengakses General Account Settings, klik bagian Email dan klik Activate Facebook Email

Di sisi lain, Cameron Scott, dari ComputerWorld, mempertanyakan masalah privasi dari email Facebook ini. 

Karena alamatnya akan sama dengan username di profil publik, orang (atau spammer) akan mudah mengetahui alamat email pengguna Facebook.



Sumber :
The Australian




sumber : tekno.kompas.com

Minggu, 08 April 2012

Ini Dia Tanda-tanda Kecanduan Akut Facebook



Gothenburg - Facebook bikin orang kecanduan. Riset membuktikan, begitu banyak pengguna yang buru-buru ingin login ke Facebook begitu mulai menyalakan komputer.

Perilaku ini disimpulkan sebagai gejala ketergantungan (adiksi). Imbasnya, bisa bikin sang pengguna menderita dan tak bahagia dengan kehidupan nyatanya.

Penelitian yang dilakukan Universitas Gothenburg ini mengambil polling 1000 orang yang berusia 18 tahun hingga 73 tahun di Swedia.

Hasilnya, 85% dari pengguna mengaku mengakses Facebook tiap hari, dan separuhnya mengaku langsung start Facebook-an begitu mereka membuka web browsernya.

Setengah dari responden mengaku khawatir mereka 'tak jadi bagian penting' di Facebook jika mereka tidak login, dan 25% merasa resah jika tidak login secara reguler.

Seperti dikutip detikINET dari Daily Mail, Senin (9/4/2012), pengguna Facebook lebih banyak dari kaum wanita. Dilaporkan, pengguna aktif jejaring sosial itu juga lebih banyak datang dari kalangan berpendidikan rendah serta berpenghasilan kecil.

Di sisi lain, masih dari hasil riset itu, Facebook tak sepenuhnya dinilai negatif karena bisa jadi ajang untuk pencitraan positif dan menjalin relasi bersama teman dan keluarga.

"Pengguna tak menulis tentang segalanya di Facebook. Mayoritas konten yang di-sharing masih berkaitan dengan event besar, event positif, dan ketika sedang merasa baik-baik saja. Cuma 38% yang menuliskan emosi negatifnya," kata Leif Denti, salah satu peneliti.


sumber : inet.detik.com

Sabtu, 07 April 2012

Microsoft Introduces 11 Kinect-Based Startups


Microsoft probably had no idea its Kinect motion-based gaming device could be hacked and utilized for various situations beyond video gaming. The company launched the Kinect Accelerator program back in November in a mission to help these cottage hackers take their Kinect development even further. The chosen startups will work closely with mentors from Microsoft Research, Microsoft Studios, Kinect for Windows, and the Xbox team as they provide support and knowledge.
The Kinect Accelerator program received almost 500 applicants, winnowing the selection to 50 before finally settling to 11 groups–one more than their original plan of taking 10 groups under their wing. These groups hail from across the globe and will receive $20,000 and office space, as well as Kinect hardware and development software to turn their ideas into reality.
Microsoft did not reveal what exactly each team is working on, only hinting that their Kinect-based programs would benefit the medical, retail, fashion, and even farm industries. The specifics of their startups would be revealed once the mentorship program concludes.

source : gadget.com
Source: Engadget 

ION Air Pro POV


People are getting more and more acquainted with portable action cameras, especially the sporty types. It allows them to record action video of their exploits from their own point of view of the action. While there can be a limited number wearable action cameras available, it is by any means a growing market that has attracted other makers into the fold. One of those who will be in this mix is ION as it introduces its new ION Air Pro POV Camera.
The new ION Air Pro POV Action Camera is an action camera that allows users to shoot HD video while also sharing it with friends online in real time. It is one of the very first smartphone compatible action cameras in the market. It is both compatible with iOS and Android devices. It can be attached conveniently on a bike mount or in any type of helmet via its CamLOCK System. It also comes with a rechargeable battery that’s good for up to 7 hours of recording time. WiFi capability allows this camera to wirelessly connect with a smartphone and share what it sees to people online in real time. Consider it as a portable HD Action Webcam that you can connect to your smartphone. The ION Air Pro PIV camera is now available in the market and will go for around 229 UK Pounds or US$365 for only the camera. The full WiFi version of the camera will cost around 299 UK Pounds or US$475 when it comes out next month.

source : gadget.com
Image Source: ION

Epicurious iPad App


Getting that urge to cook something can happen anytime. But what to cook at a certain time and with what’s available is always a challenge for some people. For those who would wish to have this resolved can always have this Epicurious iPad app handy.
The Epicurious iPad app is a very useful tool to have around the kitchen or pretty much anywhere else where food and cooking is concerned. First and foremost, it provides iPad users with the access to around 30,000 professionally created and tested recipes, all presented in a convenient cookbook layout. It also provides users with other handy tools such as what cooking options they have with what stuff is currently available in their fridge. Users can simply type in the ingredients that they currently have and the Epicurious app will provide a number of possible recipes that they can conjure up for the day’s menu. If there is something missing, the app can make up a shopping list for them the next time they head out to the supermarket.
The Epicurious app also provides users with nutritional information for the different recipes in store. That is why it may also be a handy app for the health conscious set that always looks out for what they eat or cook. Users can also save and share their favorite recipes via their preferred social networks.

source : gadget.com

Instapaper Pro iPad App


Apple iPad users usually have a convenient means to go and browse over the Web wherever they are. They may find many interesting articles and content to read about. But sometimes they may not have the time to read them all at just one sitting. In cases where people may have a lot of interesting online articles to read but do not have the time right now to read them all, there’s the Instapaper Pro iPad app that might be quite the helpful tool.
The Instapaper Pro is a handy iPad app that allows users to mark and save the many interesting articles they have browsed over the Web for later reading. Instapaper downloads them into the device, making them available for reading even when offline. The app also presents the articles in text optimized view to make them easy to read by iPad users. Text fonts and sizes can also be adjusted.
The Instapaper Pro app also provides a Dark Mode for people with the habit of reading in the dark. The app also has a built-in dictionary, making it easy for people to look up certain terms that they are not really sure what it means. Able to download up to 500 articles at a time, the Instapaper iPad app makes it easier for people to catch up on their reading whenever they have the time. This useful iPad app is available at Apple App Store for a $4.99 download.

source : gadget.com
Image Source: App Store

When Apple and Google Asked to Help Police


KOMPAS.com - Police United States tried to embrace Apple and Google to support digital forensics to uncover a CASE law. As the owner of the most popular mobile Operating Systems now husband, two sons of the deferred taxes are required in order to open the ACCESS related ongoing police who wish to be examined.
Smartphone, a prayer One device frequently checked the police to present additional facts. However, when the defendant locked his smartphone ACCESS, would not want the police to work the same Google Search Article child tax liabilities Operating System owners.
When accessing the Request for smartphone has been approved by a judge, usually the child tax liabilities NUSANTARA MEDIA has no choice but to obey.
Law enforcement is a language From the San Francisco Bay Area, said at least Apple has 3 support the police in recent years. HOW, Apple remove the iPhone screen mohammad The code for the retrieval of Investigation confiscated. THERE IS mohammad code is usually 4 digits.
As for the access to an Android device, the only way is to ask Articles Google Search Google Gmail password reset user name and users. Then, the username and password has been reset ITU handed over to police.
However, Google is known to be very strict confidentiality and security of the owner's Gmail account. Need extra negotiations to convince Google to reset the user account.
From the Sacramento Sheriff language, Mutations April 2012 Husband filed a joint training Google Search for New Articles Apple And Google, in order to assist the process of making law enforcement the article open the Google Search Unbeknownst pemilikya ACCESS smartphone.
What do the initials AS policing is effective in dismantling the crime. Now the gadget Much like a wallet or diary, the store conversations, photos, videos and activities of a person traveling.
Predict the site CNet Technology, Will the Rajin police mobile devices accessing the tripping CASE orangutan.

Source :


source : tekno.kompas.com

Jumat, 06 April 2012

10 Wish "Online"





KOMPAS.com - A study conducted by Forrester reported that in the moments before the holidays, consumers who shop online increased.
Are pleased not only selling web sites, but also the "digital robber" As more and more transactions, the greater the chance they get what they want.
How to avoid the interference of the criminals? Here are 10 guidelines for trading safely online:
A. Do research on the web site where you shopThese tips should be done if you like clothes shopping online at your own web site that is less familiar. Check the seller's phone number and contact.
If not convinced, go to Google or Yahoo search engine and enter the name of that website. Look for reviews from their customers. If anything goes wrong, please, just leave the website.
2. Read the policy carefully to the web sites of your personal dataDo not get any points in the policy which states that the web site manager may give personal data to other parties.
Also read the returns policy. Because the items purchased can not be seen physically, there must be guarantees that the goods are shipped defective, you may send the defective items back and of course be replaced with a new item or your money back.
Also check who pays the return item.
3. Check the package of goods by reading the product description carefully.Curigailah on branded goods are sold at huge discounts.
4. Do not be easily tempted bargain huntersDo not rush to fall in love with the offer of goods at low prices that come from e-mail, let alone ask for ID and password without permission from the owner of the e-mail. That usually work spammer.
But be careful, spammers can also seduce. He sent an e-mail that seems to come from a good company. Instead, visit the company web site carefully, and direct spending darisana. Do not via e-mail or pop-up window.
5. Find a sign that the website was secureThe sign is usually a padlock in the status bar (status bar) browser. Before submitting any personal information, check out the sign was there.
When you are prompted to enter registration information credit card numbers, see the web site address. Web site address should change from http to "shttp 'or' https'. This means that payment information is encrypted, better be safe anyway.
6. Secure Your PCYour PC must have a minimum of antivirus. Better yet, if you have anti-spyware and firewall. Remember, security software must be updated regularly so that your PC is protected from the latest threats. Good, just set the automatic update process.
7. Consider ways of paymentPayment is usually made by credit card. With a credit card, you have strong evidence that you've done a transaction if the goods are not delivered or not to order.
But, because of the theft of a credit card number, payment by using a system such as PayPal, Transfer Send, or COD may be considered.
8. Check the total price.Prices of goods, plus the cost of a pack, plus postage, hopefully there is the discount.Compare the total price of a web site with another web site.
9. Keep proof of the transactionIncludes product description and price, digital receipts, and also a copy of the e-mail between you and the seller.
10. Turn off your PC after the transactionIf the PC is turned on, could have been there robber who had planted malware, took over control of the PC and perform transactions.


source : tekno.kompas.com

Kamis, 05 April 2012

Caution, Pitfalls Free Gifts on Twitter and Facebook





Jakarta - The next time you receive an offer for free on the internet iPad, beware. As the old saying goes, if something sounds impossible, it may very well be.
Internet and computer security firm Symantec reported, scammers in droves visited social networking sites like Twitter and Facebook to launch the action.
As is known, Twitter and Facebook itself is flooded with various brands because they know the use of social networking to their marketing campaigns.
Well, beyond that scammers are also good at taking advantage of opportunities. They sought to benefit financially from the victim. The tactic is commonly used, such as Symantec reported on Thursday (04/05/2012) is as follows.
A. Provide a direct link to the affiliate site
A few days before and after the announcement of the new third-generation iPad for example, users who ngetweet about the new tablet is likely to receive replies from scammers who directed Twitter offers a free iPad.
Many of these links actually redirect to the affiliate page that asked personal information such as email address and shipping information.
A number of scammers also started to send video to the YouTube user guide that guides the user step-by-step process to get their free iPad or iPhone.
The scammer then uses the description of the video to redirect to the affiliate page and then trick users into providing personal information.
2. Creating a fake user account promotion
This one mode, the user is redirected to a fake Twitter account in a particular brand. If you receive a reply from an unknown Twitter account that promises something for free, protect yourself and other users to report the account to Twitter.
Symantec advises users to be cautious when clicking on the URL without finding out first using a preview or a plug-in. Users are also required to be wary if asked to provide personal information. First, make sure that requests for information is legitimate.


source : inet.detik.com

Senin, 02 April 2012

Facebook Create Counter Google Search Engine?


KOMPAS.com - called are stepping up its search engine capabilities. About 24 technicians Facebook search engine is to reform the system searches social networking giant is.
Interestingly, the team led by Lars Rasmussen, the former manager of Google engineers. As reported by Bloomberg Business Week, Facebook allegedly was making a search engine to rival Google's search engine.
Steps taken this up like a reaction to the presence of social networks that made Google, the Google +. For social networks, can be called up was the king. When Google entered the realm of that too, then Facebook would want to go into business they work at Google, the search engine.
During this search engine just released Facebook search results that are within the social network Facebook. After repair, the search engine will be issued up search results from outside of Facebook, especially if the user had to open the website.
Increased ability of search engines is expected to make up more attractive to users, advertisers, and investors.
"Search, has a strong functional, but still lack the Facebook interface," said Rebecca Lieb, media analyst Alitmeter Group Digital Advertising. "It's something that not only has benefits for the ads, but also will appeal to users," he added.
Lieb added that the opportunity to insert ads influenced by the social graph made by Google with Search Plus program Your World. Facebook could do better, but more complex, he said.
"Information must be sorted in real time, and include spacious. It is indeed not be easy, but it would be more profitable," said Lieb.
This search engine improvements, according to Lieb, will spend a long time. However, he believes Facebook will announce if it has been completed. Lieb believes this is because the business potential of search engines will generate a substantial income.As of this writing, Facebook has not responded regarding the Lieb claim.

source : tekno.kompas.com