Monday, October 4, 2010

Use Canon, Do not Fear the Dark

0 comments
Already bored with the result that shaded images (blurred) and sprinkled with noise when shooting at night or in low light? Do not worry, Canon has a solution.Some time ago, Canon introduced the most advanced breakthrough innovation. His name HS System. This technology combines the latest light-sensitive sensor (High Sensitivity Sensor) and advanced DIGIC 4 processor with the latest algorithms. In addition to this system, Canon IS buried Hybrid technology that makes the image stabilizer function (Image Stabilization) increased rapidly.Both technologies are able to create images that stay sharp, smooth, and bright colored objects are in place despite minimal or glow in the room. High ISO settings and even the maximum zoom will no longer ruin the images.
HS Technology System you can enjoy the three latest camera models, the Canon Power Shot G12, Power Shot S95, and Canon IXUS 1000HS. Two first name is also equipped with Hybrid technology IS. Not to forget, there is also the ability and mode of AF Tracking High-Dynamic Range (HDR).In addition to these three cameras, Canon also launched two new models in the SX series, the Canon Power Shot SX30 IS and SX130 IS. With a capacity of up to 32x zoom, SX30 IS and even broke the record as a digital camera with Optical Zoom longest in the world today.
Read more...

AMD's New Processors stormed to 6

0 comments
Although not held a big celebration as did Intel (event IDF - Intel Developer Forum), the AMD continues to innovate by directly introducing its new line of processors.No half-hearted, direct AMD introduces new processors up to 6 units for the desktop which is a class II Phenom and Athlon II.Here is a line of AMD processors are ready to thrown into the market:1. Phenom II X6 1075TThese processors complement AMD line of processors which has 6 core in it. Comes with a speed of 3, GHz and has a maximum speed in turbo mode up to 3.5 GHz. Processor selling prices of about U.S. $ 245 (approximately USD 2.2 million).
2. 970 Phenom X4 Black Edition II
Is the highest series of Phenom X4 family. It has a standard speed of 3.5 GHz, 2MB L2 cache and 6MB of L3, and offered at a price of U.S. $ 185 (approximately USD 1.6 million).
3. Phenom II 560 X2 Black EditionPresent to accompany the gamer with limited pocket. This processor has a speed of 3.3 GHz, 1MB L2 cache and 6MB of L3, was pegged at U.S. $ 105 price range (approximately (USD 945 thousand).4. Athlon II X4 645Without the suffix Black Edition of this product signifies little to overclock equally harmful. But the speed is high enough ie, 3.1 GHz, 2MB L2 cache memory (without L3), and sell for around U.S. $ 122 (USD 1 million-an).5. Athlon II X3 450It has a speed of 3.2 GHz, 1.5 MB L2 cache memory (without L3), and released at the price range of U.S. $ 87 (about USD 785 thousand). By carrying out the 3 cores in it, this product is claimed to be suitable for use in everyday computing.6. Athlon X2 II 265With 2 pieces of brains in it to make this product fills a place in the lower classes. This processor has a speed of 3.3 GHz, 2MB L2 cache for memory and pegged the price of U.S. $ 76 (about USD 685 thousand).All of these processors use socket AM3 platforms but still compatible on socket AM2-based motherboards. In all of this new line of AMD taking primacy Vision technology to support the activities of 3D graphics and high definition entertainment.
Read more...

Wild Oracle Open World 2010

0 comments
Oracle Open World 2010, the largest industry event for Oracle technology, was held from 21 September 2010.Located in San Francisco - United States, this annual event was attended by 40 thousand visitors. They include Oracle users from business and strategic partners. Over the next five days, held a variety of educational sessions and the event to share insights about Oracle's strategy and road map. In addition, the conference also held Java One and Oracle Develop.Some of the agenda in the event Oracle Open World 2010 are: keynote speech from representatives of Oracle, Dell, Fujitsu, HP, Info sys, and Rally Software;
sessions and tracks Server and Storage Systems; industry specific sessions, as well as educational sessions and trials that target the developer community.In this event also, Oracle announced a new application, Oracle ORM On Demand Release 18. In this release, they integrate the marketing and sales management, business plan, complete with security enterprise-level clouds.In addition, Oracle's continued support for Java and open source developer community. The number of members of the community of developers Oracle Technology Network (OTN) has surpassed the 10 million. Oracle also contributed new code to the Eclipse Foundation, named Sapphire. The new code is intended to help design the interface better use of the application.
Read more...

Check the condition of the Hard Disk

0 comments
Computer or your laptop often hangs, restarts itself or the performance of your computer once more feels slow? if you experience any of the above, chances are you have been hit hard disk bad sectors. Bad sectors is a condition where your hard drive already had worn so that no part (sector) can not be certain that legible. This happens because your computer is often not properly shut down (press the restart button or power suddenly goes out.)
Hard disk bad sector affected will lead to computer performance dropped dramatically or too often experience hangs even blue screen. The situation sometimes bad sectors also cause damage to data stored in the affected area for bad sectors. Want to know if your hard disk you are experiencing such circumstances above? Check your computer's hard disk, how? Read on this article.
Actually, on windows XP already available tools you can use to check the condition of your hard disk, but because this facility was under dos, I think for a layman like me the information produced is less understandable.
Well if you want to check the condition of your hard disk with ease, there are a few choice tools or 3rd party software that can produce information that is complete and easy to understand them is HD Tune and HDDScan.
HD Tune Pro 3.50 - Hard Disk UtilityHD Tune Pro be the best choice of software to make checking your hard disk. A lot of information we get, 4 of which are Benchmark, Information, Health and Error Scan.1. Benchmark will give you the speed of information literacy and computer hard disk access time.2. Info will give you detailed information on your hard disk, start from what features in supported by your drive as well as information about your drive firmware.3. Health gives you information on your hard disk health conditions (health status).4. Error scan. This feature will give you reports if there are errors on your hard disk and this feature you can use to check whether the hard disk that you have been exposed to bad sectors or not. To obtain accurate information, do not use the quick scan. If the results of a scan error is in red it means your hard disk has damaged (bad sectors).
HDDScan 3.2In contrast to HD Tune, this software is devoted to check the condition of the hard disk drive (HDD low level scan). The advantages of HDDScan is HDDScan able to provide more detailed information by displaying the access time of each block (section) on your hard drive. Not only that, another advantage lies in its ability to do the checking (scanning) in several media IDE / SATA / SCSI hard disk drives, RAID arrays, external USB / Firewire hard disks and flash cards.
To scan you just clicking 2 times HDDScan.exe file and click on SMART and see his report. Hard disk that has a good condition marked green on the results of his scan. If you sign the form of an exclamation mark, it indicates there is a problem on your hard disk.
After knowing the condition of your computer's hard disk, now you can find out what's causing your computer not running as you wish (often blank, slow and blue screen), it's time to take action. Before taking action to replace your hard disk, follow steps how to repair hard disk bad sector affected.
Read more...

Google Instant, Superfast Seeker

0 comments
Google's search technology, introduced a few weeks ago is reportedly more nimble than the method of auto-complete suggestion that has been applied to Google at this time. Marissa Mayer (VP Search & User Experience, Google) and even dare to call this new technology as a quantum leap in search technology.
With auto-complete suggestion, when a user will type, for example the word WEATHER, the search box will suggest the word "weather" so users type WE. Now Google Instant will show search results as users type. In a demonstration conducted at the launch of Instant, the search results of "weather" has been posted as a new user to type the letter W.
Another feature is the scroll presented to Google's Instant Search. When users type in search keywords, an auto-fill suggestion appears on the right complete with drop-down menu contains suggestions (suggestion) others.
Launched internationally, Google Instant immersed in 4 most popular browsers: Internet Explorer 8, Firefox, Chrome, and Safari. Beginning next year, Google is also planning a mobile version of Instant. According to Marissa Mayer, Instant technologies will also be available on Google's other platforms, including Google Appliance for Enterprise in 2011.To sustain Instant technology, Google experts to develop a sophisticated caching techniques. Caching technique is able to receive and manage billions of information that will be used to anticipate and show search results in an instant.
Read more...

Supports AMD Dell Inspiron 13z

0 comments
Completing the line of thin notebooks, Dell presents Inspiron 13z. Notebook which has also been supported by technology vision made by AMD.
13z a notebook with a stylish look, lightweight (weighs less than 1.8 kg), and thin (less than 1 inch).
Curious about the innards Inspiron 13z? This thin notebook equipped with AMD Turion II Neo K625 II with specifications up to 1.49 GHz, 2 MB L2 Cache. Inspiron 13z also be a good choice if you crave the convenience of accessing your personal files and want to share photos. secure video wirelessly.
With a stylish design, sporty, not so much trouble 13z Inspiron owners. With a 13.3 inch wide screen that carries, Inspiron 13z very fitting in the insert into the bag. To you who boast contemporary appearance, would be very comfortable bringing Inspiron 13z as a mobile entertainment.
Support ATI Mobility Radeon HD 4200 graphics and a built-in HDMI port for carrying audio display high-definition video in a single cable, also make the Inspiron 13z to provide a multimedia experience with easy to connect to the TV screen and a larger monitor.On the same day, computer vendors from the United States has also helped introduce the Inspiron One, All in One PC. A PC that combines computing experience with the appearance of luxury, unique, and elegant.
"All-in-One", which referred to Dell is that users can enjoy features Wi-Fi, Webcam, multimedia, disk storage, DVD drive, and power adapter in a single widescreen display stunning High-Definition.
Read more...
Monday, May 31, 2010

PayPal Mobile So Wallet Virtual Magic

0 comments
In the days of all-digital as of this moment, anything can be done through the "virtual world." No exception to the transfer of money. Therefore, do not be surprised if a particular service provider sends a lot of money is strewn everywhere. GCASH Globe, a mobile wallet service with the fastest growth in Asia, announced the end of May this new opportunity for its customers who are domiciled in the U.S. who want to send funds to the Philippines. With this new service, inevitably, users will experience how safe, convenient, and affordable in transferring funds to the Globe or TM mobile phone in the Philippines are listed on the website GCASH through GCASH (www.globe.com.ph). So what lies behind GCASH money transfer service launched this instant? According to reports the world's migration and development banks, the level of remittances worldwide reached U.S. $ 316 billion in 2009. This amount is expected to increase by 6.2% in 2010 and 7.1% in 2011. Traffic such remittances, among others participate is influenced by the 10 million Filipino workers, whether immigrants or contract transferring money of U.S. $ 17 billion per year.
To send money through the web site GCASH Online, U.S. PayPal account holders can simply enter the Globe or TM number of the recipient in the Philippines listed in GCASH, the following amount of fund they want to send. Furthermore, they will be redirected to their PayPal account to check and confirm their transaction. When it is done, the recipient in the Philippines will be notified via text messages on their phones. Furthermore, the funds will be automatically credited to the recipient GCASH wallet. Here, the recipient was given the freedom to choose these funds will be cashed at one of 18 000 GCASH outlets throughout the Philippines. Funds they receive can be immediately used to purchase goods, pay bills or make purchases from online merchants or retailers.
Read more...
Saturday, May 15, 2010

Examsoon Vcp-410 Exam Guide

0 comments
Today, getting VMWare Certification examination certified has become candidates' common choice to get fired or get promotion. Many of them have made it with the help of Examsoon test engine.Hotheyver, there is a question in many people's mind, that is, "Can I pass the VCP-410 exam without the help of Examsoon bible?" It is believed that Examsoon VCP-410  is the best helper for the candidates with its up-to-date Q&A and 100% test objectives
coverage.It is a really a hard way for you to prepare your Examsoon VCP-410 all by yourself, without the help of Examsoon.Statistics have shown that a number of students pass the VCP-410 and get their VMWare by correct study method and sufficient preparation instead of by Examsoon. IT experts who have studied these exams for many years are worrying that these spreading practice exams in Internet will bring negative sooner or later.If you have a study bible that covers all the questions in the real exams, will you go over other knowledge objectives that won't appear in the exam? That might be the reason why bibles cut down the study motivation and efficiency.There is no doubt that Examsoon VCP-410 is the best assist for you exam preparation.As a study helper, Examsoon should be properly made use of, instead of being abused.A Examsoon VMWare Certification is far from enough for you. You are study for grasping knowledge, skills and experience.Everyone should have such confidence that even there is no Examsoon , still they can get VMWare Certification certified.But you can refer to it.
Examsoon.Com offers incredible career enhancing opportunities. they are a team of IT professionals that focus on providing our customers with the most up to date material for any IT certification exam. This material is so effective that they Guarantee you will pass the exam or your money back.
Come on try it on!
Read more...
Wednesday, March 24, 2010

RootKit: Digital Voodoo

0 comments
Rootkit was first introduced in SunOS operating system by Lane Davis and Steven Dake. This technology is used by Root on Unix (equivalent to the System Administrator on Windows) to recovery (restore) the root password they forget. To be able to restore the root password is not easy because it needs authorization and unlimited access to a system. Finally, a special technology was discovered that can do that later known as this rootkit.

The term rootkit is so famous after a world-class music companies who apply to secure the CD music from piracy. The case has become a very horrendous scandal because even though the goal to avoid piracy, the use of this technique allows malicious applications rootkits planted aboard the music companies.


Rootkit techniques are prone to be used for evil purposes. If you remember, a virus such as Alman or Bacalid using rootkit techniques so difficult to detect. Removal of his application could not finish 100% due to a virus of malware that uses rootkit technology to walk residents and difficult to detect. He runs invisibly, silently without a sound, and did attack you never know. No wonder so many who think like voodoo rootkit in the computer world. In fact, the rootkit is basically a technology and can be used for good and useful. An example is the use of applications rootkir antivirus, firewall, software protection, DRM (Digital Right Management), and simulation applications such as daemontools disc media. The problem, rootkit techniques can also be used to create malicious applications are difficult to overcome.

Rootkit various

Like viruses, rootkits also has many variants. Classified according to the target being attacked, rootkits distributed into 6 kinds, namely:

1. Application Rootkit
Rootkits are made by modifying the binary code of an application directly or commonly referred to as binary code patching. This type of rootkit is usually found in the type of trojan malware to inject the virus into an object or system.

2. Library rootkit
This is a rootkit targeting libraries. Library itself is a file such as a library function that has been collected into one with a view to memermudah programmers in creating and developing an application. Library marked with the suffix "etc." as "kernel.dll".

3. Kernel Rootkit
Kernel rootkit is a type of rootkit is more terrible than the previous types. Kernel rootkits run at the kernel level (mode
not protected), or on the x86 architecture system known as ring 0. About how rootkits work will be presented at next month InfoKomputer.

4. Bootloader Rootkit
Is the type of rootkit that resides on the MBR (Master Boot Records), so as to control the course of booting the operating system. This type of rootkit is also known as Bootkit or "Evil Maid Attack",

5. Level hypervisor rootkit
This type of rootkit capable memvirtualisasikan original operating system so that the guest operating system, so that the entire control of the operating system can be taken over by this type of rootkit. One of the existing rootkit is a type SubVirt, are virtual machine based rootkits are developed by Microsoft and the University of Michigan.

6. BIOS rootkits
BIOS rootkits, collectively, the firmware rootkit, the rootkit that was the most horrible deepest level, living in the neighborhood and began active firmware when all computer activity occurred early initialization.

Poverty
There are several ways to clean up malware that uses rootkit technology on an infected computer. But the method used depends on the type of rootkit that infects, so as to overcome a bit difficult when we can not exactly know what type of rootkit that may be infecting our computers. To detect a rootkit, you should run the infected computer as a slave and use the operating system of PE (preinstalled environment) or liveCD to menginvestigasinya. There are many types of this LiveCD operating system such as DSL (Damn Small Linux)-had bundled the DVD edition of congenital magazine InfoKomputer ago - and many more. Perform scanning using special software designed to clean the rootkit, then do an investigation on areas inhabited by vulnerable rootkit. Since cleaning a rootkit is operating very close relationship with the system configuration, I suggest you ask for help to people who are experts to do so. If not careful, the consequences would be fatal.

AVI vs Rootkit
For now AVI not designed to deal with rootkits, but we will continue to develop AVI to possess anti-rootkit feature. AVI itself is currently in transition or developing the latest version (version 3), which features one of the Anti-Rootkit. Not only that, AVI version 3 also has many new features that will optimize your computer security from the attacks malicious programs. Just wait for the game date.

Next month, we will explain in more detail about how each of our rootkit described above. So, do not miss!
Read more...

Challenger Little Wormwood W32/Email-Worm.Assiral Antivirus

0 comments
Let the little, tiny worm will turn off a process related to antivirus. Small chili?
Unlike the discussions on malicious programs at the previous articles, this time I am not discussing local malware, but malware is no less foreign cried with locally made.

Which will be discussed this time was W32/Email-Worm.Assiral. He is a type of malware worm that comes from abroad and the small body size, this is why I call it a small worm. Created using programming language C + +, up to now has many variants emerged. Assiral name itself is taken from the name Larissa is reversed, showing the maker's name used to introduce himself.

Endemic and Assault

Although small, this worm has the ability to spread itself via a USB Flash storage, share directories (shared directory), and e-mail. In addition he also will try to beat the antivirus in a way to stop (kill) any process which has one of the following names: 
 
AGENTSVR.EXE, ANTI-TROJAN.EXE, ANTIVIRUS.EXE, ANTS.EXE, APIMONITOR.EXE, APLICA32.EXE, APVXDWIN.EXE, ATCON.EXE, ATGUARD.EXE, ATRO55EN.EXE, ATUPDATER.EXE, ATWATCH.EXE, AUPDATE.EXE, AUTODOWN.EXE, AUTOTRACE.EXE, AUTOUPDATE.EXE, AVCONSOL.EXE, AVGSERV9.EXE, AVLTMAIN.EXE, AVPUPD.EXE, AVSYNMGR.EXE, AVWUPD32.EXE, AVXQUAR.EXE, AVprotect9x.exe, Au.exe, BD_PROFESSIONAL.EXE, BIDEF.EXE, BIDSERVER.EXE, BIPCP.EXE, BIPCPEVALSETUP.EXE, BISP.EXE, BLACKD.EXE, BLACKICE.EXE, BOOTWARN.EXE, BORG2.EXE, BS120.EXE, CCAPP.exe, CDP.EXE, CFGWIZ.EXE, CFIADMIN.EXE, CFIAUDIT.EXE, CFINET.EXE, CFINET32.EXE, CLEAN.EXE, CLEANER.EXE, CLEANER3.EXE, CLEANPC.EXE, CMGRDIAN.EXE, CMON016.EXE, CPD.EXE, CPF9X206.EXE, CPFNT206.EXE, CV.EXE, CWNB181.EXE, CWNTDWMO.EXE, D3dupdate.exe, DEFWATCH.EXE, DEPUTY.EXE, DPF.EXE, DPFSETUP.EXE, DRWATSON.EXE, DRWEBUPW.EXE, ENT.EXE, ESCANH95.EXE, ESCANHNT.EXE, ESCANV95.EXE, EXANTIVIRUS-CNET.EXE, FAST.EXE, FIREWALL.EXE, FLOWPROTECTOR.EXE, FP-WIN_TRIAL.EXE, FRW.EXE, FSAV.EXE, FSAV530STBYB.EXE, FSAV530WTBYB.EXE, FSAV95.EXE, GBMENU.EXE, GBPOLL.EXE, GUARD.EXE, HACKTRACERSETUP.EXE, HTLOG.EXE, HWPE.EXE, IAMAPP.EXE, IAMSERV.EXE, ICLOAD95.EXE, ICLOADNT.EXE, ICMON.EXE, ICSSUPPNT.EXE, ICSUPP95.EXE, ICSUPPNT.EXE, IFW2000.EXE, IPARMOR.EXE, IRIS.EXE, JAMMER.EXE, KAVLITE40ENG.EXE, KAVPERS40ENG.EXE.

List the name of antivirus programs are just a small part, actually still very much to save the page so not all written here. But if you notice, a process that killed the processes related to anti-virus. So it seems this worm to disable the antivirus application to then make a larger attack.

Besides trying to attack antivirus programs, this worm also tried to beat the seperjuangannya friend who has W32/Worm.Bropia another name IM-Worm.Win32.VB.a. W32/Worm.Bropia also a propertied foreign worm spreading ability itself through instant messenger or Intant Messenger. This is why there is a sign of "IM-Worm" at the beginning of its name, the sign that usually provided by antivirus developers to mark the characteristics of a malicious program.


When first run, will create bookmarks W32/Email-Worm.Assiral himself a mutex (Mutual Exclusion) with the name "-)(-=| L4r1 $ $ 4 Note |=-)(-". mutex is typically used for inter singkronisasi application or thread reply contained in most multi-threading applications. But here, mutex Assiral worm used to mark him with the intention to prevent re-infection (reinfection) on washed-infected computers.

For the sake of keeping himself in order to keep running every time the computer is turned on, this worm will create 3 triggers by adding value to the address registry: HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Run

Registry keys made, among others:

* "MSLARISSA" => leads to: "[system-dir] \ MSLARISSA.pif"
* "Command Prompt32" => leads to: "[system-dir] \ CmdPrompt32.pif"
* "($ 4 $ L4r1) (4nt1) (V1ruz)" => leads to: "[a win-dir] \ SP00Lsv32.pif"
* Try to open the browser directly to the destination address "http://roattack.go.ro".
* Trying to convey a message to the user and antivirus products by writing a message in the file "C: \ MESSAGE_TO_USER.txt", "C: \ MESSAGE_TO_AVs.txt", and "C: \ MESSAGE_TO_BROPIA.txt" which contains: 
 
C:\MESSAGE_TO_USER.txt:
Greetz to infected user!
I will survive
In this moment in time.
Your computer will crash,
So, you will be mine.
I will not crash,
I will not fail.
So, in this moment in time,
I will survive...
– LARISSA AUTHOR

C:\MESSAGE_TO_AVs.txt:
Greetz to AVs!
I wanna be in AV industry when I grow up :-)
  ---------------------------------------- 
       - LARISSA AUTHOR

C:\MESSAGE_TO_BROPIA.txt:
Hey Bropia.. stop making MSN worms it's stupid...
... lol -- Larissa Anti Bropia... -- Saving the world from BROPIA!!!
         - LARISSA AUTHOR

Cleaning and Prevention

To clean this worm, you can simply run the AVI which was updated you can get the DVD of this magazine innate or download at: http://www.infokomputer.com/avi/download-avi/download-link-for-avi. For prevention, install AVI as a real-time protection, and do not forget to always update your AVI to always up-to-date.
Read more...

W32/Moonlight.L: Moon Light Hazardous

0 comments
Although classified as a veteran, this worm still exist thanks to the emergence of variants. Do not want exposed to the harmful rays? Be careful and put AVI.

"Moonlight", so the worm type malware is named herself. Local worm actually been around since W32/Brontok or W32/Rontokbro era, but still exist until now. This is because variants that keep coming up now, even many reports from users of computer AVI infected by this worm. Because of that, I was interested to discuss the issue of Moonlight at this time.


Characteristic

Made using the compiler W32/Moonlight mainstay vxer (term for malicious programmers) that local VB6 (Visual Basic 6) and compressed using FSG packer PE programs. Original size of 324 KB, and after compressed to 144 KB. Its own identity using Windows XP folder icon standard.

Action (Payload)
When first run, W32/Moonlight.L will create the file "systear.dll" in a system directory, example: "C: \ WINDOWS \ system32 \ systear.dll". This file is an initialization file so that the worm can identify himself and to mark the position where the worm has spread. After that, create a file of supporting Moonlight shaped dynamic link library (DLL) "moonlight.dll" in the Windows directory (example: "C: \ WINDOWS \ moonlight.dll") and extract the MIDI-formatted music files "onceinabluemoon.mid" to the Windows directory . After that, the worm makes a directory with a random name in Windows and System subdirectory in the format "C: \ WINDOWS \ [random]". Mean "[random]" here contains random names such as:
"C: \ WINDOWS \ FLR1S4G"
"C: \ WINDOWS \ system32 \ LDF6I7R"
Use a random name is probably intended to complicate the process of investigation and cleanup.
Then the worm will reproduce itself in the following places:
* C: \ WINDOWS \ [random] \ service.exe
* C: \ WINDOWS \ [random] \ smss.exe
* C: \ WINDOWS \ [random] \ system.exe
* C: \ WINDOWS \ [random] \ winlogon.exe
* C: \ WINDOWS \ lsass.exe
* C: \ WINDOWS \ system32 \ [random] \ [random]. Cmd
* C: \ WINDOWS \ [random]. Exe
* C: \ WINDOWS \ system32 \ [random]. Exe
* C: \ WINDOWS \ [random] \ [random]. Com

W32/Moonlight.L deliberately duplicate themselves with names similar to the Windows services such as innate "smss.exe", "service.exe" with the intention that the process is not easy to stop using the Windows Task Manager built. Keep in mind, the Task Manager will refuse to stop the process with the name include: "service.exe", "smss.exe", "system.exe", "winlogon.exe", and "lsass.exe".

Because the worm is made using VB6, and because each application requires VB6 runtime named "msvbvm60.dll", the worm is smart strategy to make the runtime file is not deleted or deleted (which makes the worm can not run). Way, by making backups of the runtime files to "C: \ WINDOWS \ system \ msvbvm60.dll".
Another thing done is to make Moontime file named "MooNlight.txt" in the Windows directory (example: "C: \ Windows \ MooNlight.txt"). This file contains a message from the creators who called himself the nick "Lunalight" aka "Moonlight":


Endemic

W32/Moonlight.L dissemination is very similar to the worm aka W32/Brontok legendary W32/Rontokbro, by doubling itself to every directory with a name similar to the parent directory.

Cleaning and prevention

Fairly easy to clean, you need to do is run the AVI (Antivirus Info Computer) that has been bundled into one DVD inherent in this magazine. Run, and do checks to each location and storage media connected to your computer. Keep in mind, do not do any activity during the review process. For prevention we recommend you to install the AVI as a guard to prevent your computer infected by this worm again.


AVI 2.0.4.9 Changelog:
* Improved buffer overflow bug that caused crashes when AVI to update online.
* Improved compatibility bug with Windows Vista / 7.
* Improved access violation bug that caused crashes AVI while scanning.
* Improvement of detection of some Windows system files 7.
Read more...

AVI + Clamav: Tens of thousands Tree Attack

0 comments
One of the advantages is the existence AVI add-on (plugin). Thanks to this facility, capacity can be improved AVI easily. One of the latest add-on is owned AVI Clamsav. This is the add-ons that integrate the database into a database Clamav AVI. That way, AVI now can ward off tens of thousands of types of attacks, both locally and internationally. One who makes a good antivirus in detecting computer viruses is the definition of the threat they have. The more definition, the better antivirus in a variety of threats facing trying to enter into the computer.


AVI is one of the local antivirus that has a number of threats that limited definition. So far, the database contains AVI more local viruses. This limitation is because the number of new viruses AVI users reported only ranges from Indonesia alone. This is why many people consider the local anti-virus only works to overcome local virus alone.

And vice versa, only a potent antiviral out beyond just tackle the virus. Based on these facts, many people who eventually install two antivirus at once: one local antivirus, antivirus one out.

But the AVI has a smart solution for solving this problem. AVI now have add-on (plugin) that integrates new AVI with Clamav antivirus engines. What is Clamav? Clamav antivirus which is developed by the developers of the open source community http://www.clamav.net GPL (General Public License). You can get more information about Clamav on his official website. Current definition of a recognizable threat Clamav approximately 49 thousand threats mostly dominated by foreign viruses. Now, by combining the original database and Clamav AVI, AVI is now able to recognize approximately 50 thousand threats!

 How to Use Clamsav Plugin

To take advantage of add-on Clamav, ekstraklah file "plugin-0.4-clamsav-avi.zip" into the directory "plugins" which can be found at the location where AVI installed. For example you install the AVI in the directory "C: \ Program Files \ AVI" then ekstraklah to "C: \ Program Files \ AVI \ plugins".

Clamav add this file yourself you can get here. Make sure the add-on has been successfully integrated. How to run the AVI, then see the "Plugins". If you see a new add-shell-shaped symbol, it means that add Clamav has been successfully integrated with AVI. To make sure whether the add-Clamsav been able to work well, try double-click on the icon shaped shells. I'll get a window with information about add-on version, version of the definition of the threat, the number of threats, and info about the last definition update.


















To determine whether the definition of threats that can be recognized by the AVI has increased, you can see it in the "Signature". When we use the definitions of August 13, 2009, the number of definitions reaching over 64 thousand pieces. After the successful add-on installed, AVI automatically be able to detect foreign viruses or viruses that have not been recognized by the AVI using Clamav engine. The threat is successfully detected by Clamsav have a mark on the columns of information as you can see in the picture below. You still can disable the add-on that does not come Clamsav scanning by removing the check mark on the window Clamsav the "Settings"> "Enable plugin".










Threat definition update Clamav

You can update Clamav definitions of threats in a way to download the file "daily.cvd" and "main.cvd" Clamav site. Put the two files in the directory where the add-Clamsav placed. Please note that the file "daily.cvd" is always updated every day.
Read more...

Beware! Presence of a trigger VoIP Spammers

0 comments
As we know, spam is an "enemy" email users. Her presence was already terendus for years. Then, still remember you with 419 spam? Yes, spam related to the 419 present the emergence of spam Harry Porter, a name of "slippage" of the Harry Potter character. In July, the spam is claimed amounted to 419 for 9% of all spam.

419 spammers usually enter the users email through a text-based email, document, document in the form of word, PDF format, and even now they are also often appear on sites such as Facebook friends.

Well, of all attempts to send spam is 419, found a similarity, namely false story about the inheritance money in large quantities, familial and financial aid are notified through written messages.

However the business of the owner to block the arrival of email spam, but spammers have a thousand ways and continue to seek techniques that can bring them to the owner of the inbox. The way the other can not avoid anti-spam filters.

Recently, Symantec found a new variant of spam 419, which in this case spammers trying to exploit the service Voice over Internet Protocol (VoIP). From there, spammers will create fake accounts on sites that provide VoIP services, then this false account used to send users email invitations to invite friends using the function / invite friends via VoIP services.

On the face of spam messages that have signed the invitation will look like the original VoIP, but here in action with a slipped spammers 419 stories related to the fund or inheritance in the invitation email message.
Read more...

Virus alert "Deadlock", The message is positive but Destroy Computers

0 comments
KOMPAS.com - The message was positive with words that evoke patriotism. However, do not be lulled into sweet words that brought a new local computer virus called Deadlock. Check out the following message.

Indonesia freed our country from terrorism, Anarchists, and CCN (Collusion, Corruption & Nepotism) at the Government of the Republic of Indonesia Kubu (Civil, Army & Police) and the Catch, Fight and spacing? Without exception. Clean us from Portitusi Affairs, Social Gambling and Crime. Merdekakan ourselves from Poverty, Misery and Injustice! Along with the Democratic Party? SBY & BOEDIONO, Indonesia Joint Building Fair, Makmur & Prosperous

In the Name of the Indonesian nation
Prince Deadlock

I? M Everyone, but No one
I? M Everything, but Nothing
I? M Everywhere, but Nowhere

If your computer suddenly displays a picture with the message (see picture), you are advised to immediately take action. The reason your computer is attacked by a virus that is active and deadly.

The virus will display the message in the desktop that has taken over. Usually this message will only appear at the appointed time. Along with the emergence of this message, then all files in all drives will be deleted, including the program and the file system of Windows.

So, if you see this message on your computer, chances are it's too late for a minute of data on your computer will be destroyed. Like the saying goes "calm waters washed away", apparently in these viruses keep silent time bomb in the victim computer to be activated in accordance with the time specified.

Peak, on 12 and 13 later, Deadlock will make your computer completely destroyed deadlock aka all the data, good data throughout the hard drive, flash, and Windows file that displays the message "NTLDR is Missing".

Recognize characteristic

The virus is actually still go to the family of Visual Basic program is compressed using 2.x Petite sizes around 80 KB. Icons that are used are also not camouflaged, still use the application icon and probably came from one of the cities in Kalimantan (Samarinda).

If the virus is active on the computer, it will create some files that will run on your computer when switched on.
- C:-Windows-system32-apache.exe
- C:-Windows-system32-mysql.exe

Selection name apache and mysql likely aimed at disguising himself as a popular programs Apache and Mysql. In order for these files can be automatically activated when the computer starts, he will make a few strings in the following registry:
-HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Run
-mysql = C:-Windows-system32-mysql.exe
-HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Run
-apache = C:-Windows-system32-apache.exe

The virus is quite clever in fooling the user. Users will not be suspicious if the computer is actually infected because there are no signs that usually done by other local viruses, such as disable the Task Manager / Msconfig / Regedit or Folder Options, other than that created the file did not suspicious because it seems to be the program Apache and MySql. Users realized that the computer has been infected at the time of late, which at that time will appear the message from the virus makers are then followed by the emergence of the message "Windows File Protection error". This indicates that there is a program that seeks to remove the Windows system files.

This virus will start automatically each time users access a drive / flash disk by using the Windows autorun by making fruit 3 files, namely:
- [Desktop.ini] that contains the script to run the file [folder.htt]
- [Folder.htt], contains the script to run the main file ie [flashguard.exe]
- [Flashguard.exe] is a master file that will be run.

Flash media is one of the most widely used by the user. This is what will be used by some even virtually all of the virus to spread itself. This will also be carried out by a virus Deadlock by making some of the following files.
-Desktop.ini
-Folder.htt
-Flashguard.exe

Time bomb

Virus Deadlock like a time bomb that will destroy the target computer at the appointed time. This virus will execute the action every 12-13 dated at about 08.00-09.00 each month by ALL ERASE FILE / DATA INCLUDING WINDOWS FILE SYSTEM in all drives, including flash media using the command cmd.exe / c del / f / s / q / a and cmd.exe / c rd / s / q so that, if the computer is restarted, it will display the message "error".

So, the best way to anticipate, do not forget to do a back-up data. To prevent this viral infection, you are advised to use antivirus program that can detect this virus very well.

According Vaksincom Lab testing, current viruses detected by Norman as Deadlock not detected by the majority of existing anti-virus in Indonesia, both local and antivirus antivirus abroad. Norman Endpoint Protection detected the virus as Tibs.DKKR Deadlock.

If you want your data to be victims of this Deadlock again, never to reinstall your operating system to a hard drive that contains your data is lost. Perform critical data recovery process by using a data recovery and true methods.

If you reinstall your operating system to a hard drive that contains data you want to save, likelihood of successful recovery will be very low. If you are not experienced in data recovery and want to get professional help with data recovery of reasonable price, please contact the division Vaksincom Data Recovery in an e-mail info [at] vaksin.com.
Read more...

Time To

0 comments
As a complement and companion you every time, take advantage of Time To free the application of this. There are facilities "Memorizes" that will remind you of the commitments and agreements meeting.

There is also a menu "Balance" which can be used to mencata priorities, deadlines, and time budget. If there is a commitment which ultimately clashed job, you will be given a warning

This application is equipped with a calendar and notes, but unfortunately no list of contacts. However, this application is equipped with an alarm facility reminders, notes web page, pendata files, until the facilities Skype calls. You can also use it to install it on a portable flash disk. Facilities to import and export-related applications are also available.

Although slengkap facility, unfortunately, the visual appearance is rather tersepelekan applications. These applications seem outdated when viewed from its interface. To use, in the beginning you may be confusing and need to habituation process.

There are options to balance the schedule of activities, but still done manually. You can move the schedule from one time to another time if necessary simply by clicking on the entry attracted to schedule another time. Time for business, the stopwatch facility was very helpful. This timer will calculate an activity or project work.

As pendata schedule, Time To be very useful. Indeed, without the facility contact list, this application was lame. However, given the complete features, plus features synchronization with handheld devices, support 17 languages, and others, not easily turned away from Time To.
Read more...

Smart Diary

0 comments
View SmartDiary not much different from any other PIM tools. There are calendar schedule that accommodates all the folders plus the storage of various records.

This one is also like SmartPIM, more functions as a PIM for personal affairs, because there are categories of records for medical and food problems. Perhaps you can make it as a Personal Trainer.

Even so, Smart Diary also used to keep business. There are facilities such as word processing Word Pad equipped premises spelling talker.
This facility is in the Diary or journal maker. Note that the graph can be development or your daily activities.

Other facilities include a calendar schedule of activities, which can be arranged appearance daily, weekly, or monthly. Calendar entry can also be categorized so easily traceable. Schedule tasks, contact lists, and notes (notes) is a standard feature. What's interesting is Nutrition and mediation menu that you can use to adjust the intake of nutrients to the body (plus collection of food shopping) and regulator of health inspectors schedule.

At first glance, penggunannya controls similar to Microsoft Outlook. But because of its full features, it looks a little more solid. Relax, this does not make you confused menggunannya kok. The concept of the creator's easy for you to record and track the activity your life every time and analyze the results.

The development of your life are shown in graphical form. For some people is even less understandable because the graphics are somewhat less detail ditampilan. However, this graph you can use some components menlihat data connection.
Read more...

EssentialPIM Free

0 comments
Brief application reminiscent of Microsoft Outlook view. But this one was free, you can get without paying.

If you want more information, please buy a professional version. In addition to a manageable, fairly complete amenities. Plus the ease, EssentialsPIM fairly steady.

Almost all of the need to manage work and personal data available here. The application is actually provides features such as data encryption, sticky notes for desktop, send the data directly via e-mail, to the facility and the synchronization to PDA Outlok. Only those facilities not available in free version.

You still get the facility of export-import data, scheduler, making the task (to-do list), contact manager aka contacts list, to access e-mail. Setup files and folders in the PIM tool uses multi-level structures such as root in Windows Explorer so easy to navigate.

This application is fairly intuitive to use. Toolbar is available on the left side of the application helps you to create a calendar, to-do list, contacts, notes, to thrash with ease. Likewise for entering input data into each type of record.

Next you live and information input data and time. To contact data, you can import it from Outlook Express, or CSV file to vCard format, commonly used in mobile phone contact data.

This application also provides a portable version so that you can take anywhere and used on any computer. Although without carrying a notebook, keep important notes recorded during meetings with clients. Oya, the documents in this application can be printed for the reserves in the form of hard copy.
Read more...

SmartPIM

0 comments
Software Personal Information Manager (PIM) which one is more dedicated to personal purposes. But do not close the possibility you can use it as a note to record the achievement of targets.

This application will remind us of jadul agendas are usually used to store a tear-tear newspaper article or just a place to collect records.

Although it looks simple, existing facilities in a complete count it as a PIM tools. Milai of personal notes, Appointments and meetings, reminders, birthdays (birthday reminders), to-do list, address books, database, calendar, bookmarks, and recipe storage. This application also has a storage facility password (password). You can store e-mail passwords, social networking accounts, internet banking until the PIN here.

Easy Use
Applications are available in a free and paid editions provide an easy way to pick the information from various sources. Suppose you find an interesting article about something on the internet, then you just press the Ctrl and D on the keyboard, then the data will automatically be recorded in SmartPIM agenda.

Notes can also be entered manually, which is typed. However, data and documents from Word documents, Excel, PDF, Outlook, and so also directly imported into this application and stored as a record.

This application is also portable. Besides can be installed into a PC, can also be saved to the flash drive (no need to be installed). Data so that this agenda can be taken anywhere as needed. So more like a diary is not it?
Read more...

Debrief

0 comments
Debrief you can use to store important data about the work and daily activities. You can keep track of ideas, journals, assignments, lists of contacts, appointments, change of plans, a list of decisions taken, the list of risks, the results of research, until Milestones job.

Ordering notes, folders, and calendar organized intuitively so you can use it without having to read the file "Help".
Almost all data can be connected, like a diary or a reference. After that, record the action can be combined with a record of work being cultivated.

Kalendarnya facility can be used to show notes and review the work report. Note also then be used as publicity material such as reports or newsletters. Features more complete because Debrief is able to accommodate records and documents for the purposes of employment, career, education, and personal life.

View the user interface is a bit noisy, but soon after using it a while, you will immediately get used to. If you still find it difficult, there are files that will help guide you to use all the features of the application. Each folder of documents and records can be modified as needed.

This application is actually paying and are shareware, but the shareware version can be used on. Only a few features that eventually disappeared after 30 days. At the beginning you will always be given the option to use Basic display (note the facility only), Standard (notes and calendar), and Professional (all of the features shown).
Read more...

Have a Personal Assistant

0 comments
What do you do at the beginning of last year? Exactly when the needle seconds, minutes, and hours together 12 points in the middle of the night numbers. Are you one of them who prayed for waged work and everything in this new year? If so, good luck to you.

All your work and career are not equal if not accompanied by prayer and hope. However, this course is also very dependent on how you set the career and job. Doing a good life management would impact on the ease of doing the job. Easy and comfortable job done, then the brilliance of his career was more easily grasped.

How to do the job management and effective activities for all to easy to do business and nothing is left behind? PDA (or smart phone) is one of the tools. PDA users typically use apliaksi PIM (Personal Information Manager) will help you to keep track of important things. Start of the promise of meeting with clients to schedule nge-gym.

Create your not using a PDA, so-so with the agenda. This is one of the tools to schedule and activities that have long been used. However, sometimes do not make records teroragnisir well. Understandably, often marks the user's hand moved frequently. The result, you could be confused to read it, emskipun write your own.

To be more organized, it's good to note that the agenda combined with PIM software on the computer. Or maybe just change the function directly agenda with the software. Example pengategorian facilities and more neat and orderly. Create your work in front of the computer for a long time, this will apliaksi PIM felt huge benefits.


Full function Management

What's on offer this PIM applications? Well, a lot. Understandably, a personal organizer functions that eventually also regulate matters pertaining to private. Unumnya, this type of application will manage and provide the function of journals (records), address book, task list (list jobs), and calendar (which will remind of important dates such as birthdays friends or relatives, a celebration, to schedule a meeting). Some software that provides facilities PIM data synchronization in mobile phones, PDAs, or other device can be shared or exchanged with PIM data on the main PC.

It was intended to organize everything? If you have, it's time to choose the right application. Remove the first option to buy the paid software. Because that was pretty much free. If you are using applications such as Microsoft Outlook mailer, a number of PIM functions are available there, if only its essential functions are available.

Some decent software you are trying to arrange all matters and achievement. Choose the right to demand and also easy to use. Some think InfoKomputer chose complete our facility here. Just choose a proper and fitting.
Read more...

PhotoEdit

0 comments
In the Microsoft Office package, we know the image editor program called Picture Manager. This application has simple functions in processing an image, such as cropping, Resizing, and file format conversion.

There is also a feature contrast settings and lighting levels and color images and color saturation. Far from the complete word, but for ordinary users to be sufficient.

But what if you do not have the package? For example you prefer Open Office Suite is not paid. Picture Manager is the program can be downloaded separately, but only in the shareware version. For a free application completely, Photo Edit may be one alternative.

These devices have almost the same capabilities with Microsoft homemade image editors. In fact there are some functions that are not owned by Picture Manager. For example correction level and intensity of color can be adjusted based on RGB color channels. Rather than fill the numbers, you can simply play the histograms and curves as needed. Another ability you had them Photo Edit sharpen or blur the image and standard features such as autolevel, autocontrast, color balancing, flip, and rotate.

With the relatively small size, only takes about 3MB hard disk space, accompanied PhotoEdit fairly decent photographer or beginner-level image editor. At least to learn to adjust the coloring.
Read more...

Ebook

0 comments
Read more...

Etc.

0 comments
Read more...

Games

0 comments
Mini Games


Farm Frenzy 2 (PC Arcade Game)
Pirates Carribean
Oriental.Dreams
Farm_Frenzy_Pizza_Party_cybermania
Farm Frenzy 3.01 (FINAL)
Alien Shooter II 20 Mb + Crack




Games PC

Art of Murder: Cards of Destiny (2010)
Size: 4.03GB

amcdg.part01
amcdg.part02
amcdg.part03
amcdg.part04
amcdg.part05
amcdg.part06
amcdg.part07
amcdg.part08
amcdg.part09
amcdg.part10
amcdg.part11
amcdg.part12
amcdg.part13
amcdg.part14
amcdg.part15
amcdg.part16
amcdg.part17
amcdg.part18
amcdg.part19
amcdg.part20
amcdg.part21
amcdg.part22


Star Wolves 3: Civil War (2010)
Size: 3.16 GB

Star.Wolves.3.Civil.War.part01
Star.Wolves.3.Civil.War.part02
Star.Wolves.3.Civil.War.part03
Star.Wolves.3.Civil.War.part04
Star.Wolves.3.Civil.War.part05
Star.Wolves.3.Civil.War.part06
Star.Wolves.3.Civil.War.part07
Star.Wolves.3.Civil.War.part08
Star.Wolves.3.Civil.War.part09
Star.Wolves.3.Civil.War.part10
Star.Wolves.3.Civil.War.part11
Star.Wolves.3.Civil.War.part12
Star.Wolves.3.Civil.War.part13
Star.Wolves.3.Civil.War.part14
Star.Wolves.3.Civil.War.part15
Star.Wolves.3.Civil.War.part16
Star.Wolves.3.Civil.War.part17
Star.Wolves.3.Civil.War.part18


Empire Earth III RELOADED
Size: 4.53 GB

Empire.Earth.III-RELOADED.part01
Empire.Earth.III-RELOADED.part02
Empire.Earth.III-RELOADED.part03
Empire.Earth.III-RELOADED.part04
Empire.Earth.III-RELOADED.part05
Empire.Earth.III-RELOADED.part06
Empire.Earth.III-RELOADED.part07
Empire.Earth.III-RELOADED.part08
Empire.Earth.III-RELOADED.part09
Empire.Earth.III-RELOADED.part10
Empire.Earth.III-RELOADED.part11
Empire.Earth.III-RELOADED.part12
Empire.Earth.III-RELOADED.part13
Empire.Earth.III-RELOADED.part14
Empire.Earth.III-RELOADED.part15
Empire.Earth.III-RELOADED.part16
Empire.Earth.III-RELOADED.part17
Empire.Earth.III-RELOADED.part18
Empire.Earth.III-RELOADED.part19
Empire.Earth.III-RELOADED.part20
Empire.Earth.III-RELOADED.part21
Empire.Earth.III-RELOADED.part22
Empire.Earth.III-RELOADED.part23
Empire.Earth.III-RELOADED.part24


Empire Earth II (PC Game Highly Compressed)
Size: 260 MB

Empire.Earth.II_gfx.part1
Empire.Earth.II_gfx.part2
Empire.Earth.II_gfx.part3
Empire.Earth.II_gfx.part4
Read more...

Movie

0 comments
Read more...

Labels

 
Temporary © 2011 DheTemplate.com & Main Blogger. Supported by Makeityourring Diamond Engagement Rings

You can add link or short description here