Tampilkan postingan dengan label Security. Tampilkan semua postingan
Tampilkan postingan dengan label Security. Tampilkan semua postingan

2011/05/26

ESET Antivirus Version 5 has been equipped with Parental Control

ESET 
Antivirus Versi 5 Telah Dilengkapi dengan Parental Control
Very many users are waiting for antivirus ESET latest version of ESET antivirus products. That is why, recently ESET anti-virus which is ready to be downloaded by users, ie, ESET Antivirus version 5.To get the ESET antivirus version 5, you simply download it at http://beta.eset.com.
The advantages of this anti virus is there parental control service that helps parents to keep their children from the invasion of adult sites, or other sites that do not fit the child's age.
Meanwhile, there are other features which are no less sophisticated Advanced Heuristics Engine service as a technology flagship ESET, will actively monitor the behavior of suspicious files.
Other features found in ESET Antivirus version 5:

    
* Ability to scan faster, and higher detection with minimum false positive alarms.

    
* For the gamers: equipped facility is easier to delay the pop-up notifications, and scheduled scanning tasks while flying at full-screen POSSI.

    
* Parental Control (only exist on ESET Smart Security) features to restrict web access or for an adjustment pattern for the user control the children by making the list are allowed and which should not be visited.

    
* User profile that can distinguish the access each user is registered (only in ESET Smart Security).

    
* Device Filter more detail, in version 5 ESET is able to control removable devices that are allowed or not based on device type, size, serial number, vendor, and so forth.

    
* Auto-Scan of the Removable Media feature is useful when you insert removable media, pop-up scanning options will automatically appear. So the user can choose to scan first or not.

    
* Reputation-Powered Cloud this feature to gather information about the files of all users who participated in the Cloud System, so the detection process whitelist, blacklist malware faster.

    
* Management startup scans and better memory usage.

    
* Submission suspicious files, in this latest version features submissions or sending sample files added feature submission file false alarm. So that would make it easier for users to transmit viruses or suspicious files to ESET labs.


SOURCE :http://chip.co.id/news/read/2011/05/20/700424/ESET.Antivirus.Versi.5.Telah.Dilengkapi.dengan.Parental.Control

Kaspersky Anti-Virus 2011 Awarded the Highest Score

Kaspersky Anti-Virus 2011-Raih Nilai Tertinggi-Kaspersky Lab
Kaspersky Anti-Virus 2011 reached the highest value in the On-Demand test conducted by AV-Comparatives in February, as published by Kaspersky Lab.
These results were achieved after the AV-Comparatives experts tested the solution from twenty different developers on a computer with operating system Windows XP, Service Pack 3. Tests carried out using a collection of malware samples and other files, each product is tested to determine the level of detection of malware, the number of false positives generated and scanning speed. The collection consists of malware that use the file created in the last 6 months.
Solution Kaspersky Lab tested and a satisfactory score and was awarded the Advanced + rating, which is the highest rating. Kaspersky Anti-Virus 2011 only produce 12 false positives, which is far below the average of other developers in this test. Interestingly, 12 files are associated with almost no false positives in computer users Kaspersky Lab, according to information given by Kaspersky Security Network, a global malware detection system's cloud-based Kaspersky Lab. Meanwhile, the detection rate of Kaspersky Anti-Virus 2011 reached 97%.
"We've done a thorough job to optimize our products and we are pleased to see this reflected in the excellent results from AV-Comparatives test," said Nikita Shvetsov, head of Kaspersky Lab's Anti-Malware Research Unit. "We suggest a focus on tests that simulate the situation at the time of the user's computer is attacked malware, such as test 'Zero-day', 'Real-World' or 'Dynamic'. Although only a small number of malicious programs used, such tests can check all the technology and the level of protection in a variety of antivirus products. malicious files in this test is much more relevant than that used in some previous On-Demand test, "said Nikita complete explanation.
For more information about these test results can be seen in this document: 

PDF File
SOURCE :  http://chip.co.id/news/read/2011/05/25/746424/Kaspersky.Anti-Virus.2011.Raih.Nilai.Tertinggi

Press Release

2011/05/19

Mandatory WordPress security that we Know

 
Kemanan Worpress




WordPress CMS indisputable is the most widely used, both for the benefit of organizations and individuals. Along with its popularity, more and more also are trying to find a weakness of this engine, like a tree faster and faster the higher the wind.
Here are tips to increase the security that must be known by you who use Wordpress as a Content Management System or platform that is working to set the look, content, user administration, plugins, addons and the like.
User Administrator / AdminBy default after mengintall wordpress, then we will get the admin user. Do not penah! using the admin user, change the admin user with other users, such as your name combined with numbers. Most cases of piracy wordpress user is using the admin user using brute force.
Breaker logic is more difficult because they have to guess the username and password, while if you use the user name admin, the breaker just have to attacking your password.
Protect wp-admin Folder
Wp-admin folder is also a dangerous gap that is often used by attackers to infiltrate into your website. amankanlah-amankanlah-amankanlah! how? might be a little more work, but will not take 5 minutes to do so.
create a file. htacess that contains the settings that restrict IP whatever that can access this directory, the settings as follows:


order deny,allow deny from all # allow my work IP address allow from 192.168.1.123 192.168.1.124

Htaccess example script above to mengijikan IP 192.168.1.123 and 124 access the wp-admin folder. Most of us are internet users with a dynamic IP, whether we should change the IP every time you want to access wp-admin? the answer is Yes. To change this htaccess file you can use SFTP. Or you can use other security methods such as ApachePassword Protect example.
Use SSH instead of SFTP or FTPThe reason is simple with the SFTP data transfers that occur will happen encripsi, while FTP does not, in addition to effort and how to use FTP and SFTP are relatively similar.
Make index.htmlA simple way is powerful enough to protect a specific folder so as not browsable. create index.html files with contents up to you, for example, contains the sentence: directory access is Forbes. then save it in the plugins folder and other folders. Remember the step-step hacking is to do profiling, by knowing which plugins you use it a lot of information that can be used to find the weaknesses of your website.
Make index.htmlHow simple is powerful enough to protect a specific folder so as not browsable. create index.html file
There are many more that must be considered regarding the security wordpress, Look forward to the next tips. Good luck!




source : http://chip.co.id/news/read/2011/05/16/682424/Keamanan.Wordpress.yang.Wajib.Anda.Ketahui

Detecting Computer Problems

Mendeteksi Permasalahan Komputer
Image from techpatio

Detecting Computer problems are not much different from you detect a lack of seasoning on the food (in the context of detecting damage to the public). It is important for you to know the actual pemasalahan computer you use or you will experience this problem again and again in the future.
If a dish of food was bland, you have to do is add salt or if a dish was already sour and smell means the dish is already stale and must be discarded. Likewise with your slow computer there are various possible reasons, the following simple tips to detect the most likely cause your computer problems.
Laptop / Computer Slow
There are so many factors that could cause the laptop is running slow, among others:
1. Hard Drive Capacity
See hard disk capacity is used, If the hard disk capacity is used up 90% then the laptop will experience a drastic decline in performance. Backup your data that is rarely used (archive) into other media, into a DVD for example, or other alternative to add capacity laptop hard drive, try the remaining space more than 20%.
Perform regular defragmentation, so that your hard disk running optimally.

 
2. Virus
The virus is also one of the main causes of the computer is running slow, why slow down a computer virus? Viruses always interrupt the algorithm an application that has been infected by the virus, otherwise the virus also makes the services that interrupt. Scan and clean your hard drive for viruses, if your system is infected by a virus then this method will surely greatly increase computer performance.
3. Too Many Applications installed
Each program / application that is installed add a new burden on your computer, re-application Inventory everything what you need. It is better if you me-remove/uninstall programs that you no longer use or maybe you can turn off the service program (how terakir need a flair for doing).

Input output
Problems with Input / Output:
Often akitifitas had our computers can not be separated by other activities; Eat example. When we eat while moving around with the computer automated food debris and dirt will stick on the keyboard and mouse if it is done often it will be entered into. routinely cleaned monthly with a brush for the keyboard and her wipes with a tissue soaked with alcohol to clean the mouse.
If Port VGA, Printer, Lan Card and others are not functioning properly you should do in general is clean before you attempt to claim that this component is damaged. Why is the output port is often problematic? general case is that there is an input port that is dirty by the dust and then inserted directly keport computer will contaminate and hinder the transfer of data.
Computers / Laptop Heat
Computer or Laptop if it is too hot in general are too long due to the use, the device is working too hard, or might be due to cooling systemnya not work well, a sign of the cooling system was not working properly is usually the fan sounds loud.
That's the common problems you should know as a user's computer, laptop or other gadgets that use the system komuterisasi (of course). Which, allowing for anticipation or tackle your own before you ask for help from a professional to overcome permalahan that you think is more complicated.



source : http://chip.co.id/news/read/2011/05/18/685424/Mendeteksi.Permasalahan.Komputer

2011/05/16

Adding Applications in Windows Desktop Right Click Menu

Every computer user has the application most frequently opened, how this application can easily access us? one way is to make a short-cut, but for those of you who do not like clutter your desktop screen, the following ways you can apply. Follow the step by step below.

For example, we will add a notepad into the right-click menu.

Resgistry Open your editor and follow the path below:

HKEY_CLASSES_ROOT\Directory\Background\shell

Right click on the shell> New> Key and write the name of the application you wish, this name will later appear on the menu.


Right click on the Notepad> New> Key and create a new key with the command name (in lowercase / lowercase).


Next you need the full path of the application you want, connect and put it into the command value. for example notepad can be obtained as the following caption:

click on the command and double-click the default key on the right hand and then input the application path that has been copied.

Click ok then retart computer, right click on desktop computer and you will see something new on the right-click menu, good luck


source : http://chip.co.id/news/read/2011/05/05/638424/Menambahkan.Aplikasi.pada.Menu.Klik.Kanan.Windows.Desktop

Faster access Google Service with the Command Line

Google Docs Command Line

Sometimes I get complaints from friends, that they have difficulty in accessing google google docs or any other service. And the answer I give is always the same, namely: the problem is on their Internet connection. For email service you can use basic HTML mode, while for other services you may be able to use the Command Line to access more quickly. How do I? follow the steps below.

This time I try to use Mac OS X.



     * Entrance to the terminal "command + space" type terminal.
     * On the laptop you have already installed python, if it does not follow these 

        steps:
           o create a new directory from the terminal: $ mkdir ~ / source /
           o enter into such foder: $ cd ~ / source
           o run this script: $ curl -0 http://gdata-python-client.googlecode.com/files

              /gdata-2.0.10.tar.gz (download)
           o extract tar it with: $ tar xzvf gdata-2.0.10.tar.gz


 




o Go into the directory: $ cd gdata-2.0.10
           o Then install with the command: $ sudo python setup.py install
     * Next Install google command line:
           o download from here: $ curl -0 http://googlecl.googlecode.com/files/googlecl-0.9.5.tar.gz
           o extract tar it with: $ tar xzvf googlecl-0.9.5.tar.gz
           o Go into the directory: $ cd googlecl-0.9.5.tar.gz
           o Then install with the command: $ sudo python setup.py install

Done, you can access Google via the command line commands from the computer, which of course is much faster because it does not display the UI that takes a lot of resources.

Now try to access the google command line, how like the following:
entrance to the terminal, or command prompt if you use Windows OS

> google

> help

to see what you can do this via the command line google

for example, to view your calendar

> calendar list

add event to your calendar

> calendar add "Lunch with the client tomorrow afternoon"

to mengakiri command line

> quit

or upload photos to picasa, post your draft article to bloggers and others

in the process, you will be asked for authorization can you allow through your service google account settings.



Well, to moving around with google speed Internet service should not be malasah anymore right? good luck  !



source : http://chip.co.id/news/read/2011/05/13/674424/Mengakses.Google.Service.Lebih.Cepat.dengan.Command.Line 

2011/05/10

How to Create a Bootable Windows XP from an ISO through FlashDisk

When about to install Windows, but the computer does not have a good cd room or cd of Windows we can not read them properly. Do not be confused first, the flash can be used as a replacement cd room. Use ISO Files win, to menggunak iso file windows XP / Vista way is:

1. Install UltraISO first

2. Once installed do with click Start> My computer>> at Withers Removable storage devices select and right click on CD Drive (?)>> UltraISO>> mount



Next look for windows XP iso file that you saved on your PC if you've found it click Open



source : http://www.arywijaya.com/cara-membuat-bootable-windows-xp-dari-iso-melalui-flashdisk/

2011/04/21

RIM Make sure Install Internet Content Filter


CHIP Online - RIM Logo

Research in Motion (RIM) as the provider of BlackBerry handsets and services. Finally issued an official statement regarding the threat of government which will close the existence of BlackBerry in Indonesia, if within two weeks of RIM does not install filtering pornographic content.

The following is a statement CHIP.co.id RIM received through electronic messages, Monday (10/1/2010):

"About priority Indonesian Minister of Communications and Information Technology to perform filtering Internet content. RIM sure will follow the wishes of the Minister Tifatul for Internet content filtering to our BlackBerry customers. "

In addition to revealing the subject at the top. RIM also reaffirmed its commitment to work closely with network operators and governments, to implement technical solutions to counteract the pornographic content, which will satisfy all parties. But the statement has not been ascertained whether the government will appropriate deadline January 17, 2011 or not.

Hopefully, with the official statement of this RIM BlackBerry can soothe our customers, to not sell their smart phones, due to some poor across a crowded news in BlackBerry Messenger, Twitter, and Facebook a few days.


source : http://chip.co.id/news/read/2011/01/10/103424/RIM.Pastikan.Pasang.Penyaring.Konten.Internet

Increasing Number of Threats On Mobile Devices

Peningkatan Jumlah Ancaman Pada Perangkat Mobile


Kaspersky Lab Data show the number of malicious programs that target mobile devices more than doubled between August 2009 and December 2010.
In the year 2010, more than 65% of new threats that target mobile device is detected as compared with last year, and more than 1,000 different variants of the 153 families who belong to it as a threat to the mobile device is inserted into a database at the end of 2010 Kaspersky Lab.
Since the year 2010 onwards, send a message paid into a single scheme that is illegal for virus makers to make money and develop the threats that target different platforms.
They also use other illegal schemes such as mobile banking to direct Internet users to phishing sites and steal passwords sent by banks to mobile phone. Threats to mobile devices become more complex than before, including the emergence of mobile bots and other software that is controlled remotely.
With the growing popularity of the Android platform so that this platform is no doubt attract the attention of cyber criminals. In August 2010, the first malicious program that targets Android detected, and since then, the number has reached 15 courses from a total of 7 families.
The first threat that targets Apple's iPhone OS also emerged during the last reporting period, but only devices that have been infected in the 'Jailbreak' to be able to install the game from a third party and other software not manufactured by Apple.
Most threats to mobile devices continue to target the Java 2 Micro Edition platform (J2ME), which is supported by a large number of mobile devices. This means not only smartphones that have a risk of infection, but also a mobile phone. The second most targeted platform is Symbian, with Python in third place.
"The use of SMS Trojan is still the easiest and effective way for cyber criminals to make money. The reason is quite simple: each mobile device, smartphone or mobile phone has a direct connection to user accounts via their mobile accounts. This direct connection is actively exploited by pejahat cyberspace, "said Denis Maslennikov, Senior Malware Analyst at Kaspersky Lab.



source : http://chip.co.id/news/read/2011/03/31/487424/Peningkatan.Jumlah.Ancaman.Pada.Perangkat.Mobile

Beware of Email Spam and Phishing and Certified Site


CHIP Online - Symantec Menginformasikan akan Waspadai Spam dan Phising dari Email dan Situs Bersertifikat


Symantec informed about the situation of spam and phishing in March, in which Brazil, Russia, India and China (BRIC) have the volume increase for the first time since August last year. The volume of spam daily average increased by 8.7 percent in February compared with the previous month. Overall, spam accounts for 80.65 percent of all email in that month, compared with 79.55 percent in January (28 / 3).
 CHIP Online - Symantec Menginformasikan akan Waspadai Spam dan Phising dari Email dan Situs Bersertifikat
 
Symantec also observed a mass phishing attacks in February on a famous brand credit card services. There are URLs in the attacks which are all protected using Secure Socket Layer (SSL). To make a phishing site that uses SSL, phishers have to make a fake SSL certificate or original certificate attack to get the encryption on the site. 
Symantec observed that phishing sites that use SSL are very few, in a kind of assault, carrying more than 100 phishing URLs that use a fake SSL certificate. Attackers do so by providing a phishing site on a single IP address is broken down into a number of domain names. SSL certificate with the date of issuance in 2006 and ended in 2007 was not valid, but the main motive of the phishers create sites appear legitimate and convincing users that the site is safe.






Phishing sites are fake a name credit card services, which target customers from Switzerland and phishing pages using the French language. Users are asked to provide login credentials of a famous brand of e-commerce. There, phishers attempt to gather confidential information from these two brands with the same phishing attacks. This phishing site hosted on a server located in California, USA. CHIP Online - Symantec Menginformasikan akan Waspadai Spam dan Phising dari Email dan Situs Bersertifikat


Phishing site requesting personal information in a two-step process. The first step is to verify user identity. Here, users are asked to enter your name, date of birth, address, email and passwords of e-commerce brands, and the birth mother's middle name. The second step asks banking data including bank name, bank ID, the card owner's name, card type, card number, personal code, the card end date, and CVV number. After entering personal information, phishing sites redirect to a blank web page. If users become victims of a phishing site, the phishers will successfully steal their information to obtain financial gain.
Symantec provides some tips for users to be more careful in doing various activities in cyberspace, such as the following:

    
* Unsubscribe from the mailing list if you do not want to receive messages 

       again from the mailing list.
    
* Be selective in terms of site when you register your email address.
    
* Avoid displaying your email address on the Internet, and use your own email 

       address which is not your primary email.
    
* Report spam if you have the option to do so.
    
* Delete all spam
    
* Avoid clicking on suspicious links in emails or IM messages, because it could 

       be connected to a fake site.
    
* Ensure that the operating system is always updated with the latest updates, 

       and use a comprehensive package of security software.
    
* Consider the anti-spam solution that has a good reputation to handle the 

       filtering in your entire organization, such as Symantec Brightmail messaging 
       security solutions family.
    
* Not open email attachments from unknown. This attachment can infect your 

       computer.
    
* Usually the forged email address, and reply to email spam spam spam will 

       result in another, so you do not reply to spam email.
    
* No fill out forms in messages that request personal or financial information 

       or passwords, for leading the company is unlikely to ask for your personal 
       information via email
    
* No purchase products or services from spam messages
    
* Not open spam messages
    
* No forward any virus warnings you receive via email, as it may be this is the 

       news lie / hoax.

source : www.symantec.com
             http://chip.co.id/news/read/2011/03/29/478424/Waspadai.Spam.dan.Phising.dari.Email.dan.Situs.Bersertifikat