Welcome To Cyber Club Community

23 December 2008

Free Dollar For You

At Bux.to, you get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money. You can earn even more by referring friends. You'll get paid $0.01 for each website you personally view and $0.01 for each website your referrals view. Payment requests can be made every day and are processed through AlertPay. The minimum payout is $10.00.

Earnings Example
» You click 10 ads per day = $0.10
» 20 referrals click 10 ads per day = $2.00
» Your daily earnings = $2.10
» Your weekly earnings = $14.70
» Your monthly earnings = $63.00

The above example is based only on 20 referrals and 10 daily clicks. Some days you will have more clicks available, some days you will have less. What if you had more referrals? What if there were more ads available?

Thousands of satisfied members that have received their payment. If you're still not convinced, read the praise of our happy members.

Join now and receive a $0.05 Sign-up Bonus

Availability Limited!
Hard to find active members? Why not let us do the referring for you? We have a limited amount of un-referred members left for sale. Packages with 15, 35, 100 and 500 referrals are available now.

20 December 2008

Tutorials for: MP3 Download Tools

Kazaa Detailed Tutorial
Do you have a little bit more time then 10 minutes. Then take yout ime to read this tutorial and see to it that you gain control over whole Kazaa.


Kazaa Lite Tutorial
Everything on Kazaa Lite. The Download program of the last few years. Download MP3, movies and more.


Kazaa Quick and Basic Tutorial
How to use Kazaa and strat downloading your music in five chapters. Official Kazaa Website


Morpheus Official Website
Find out everything you want to know about Morpheus P2P program. Download Morpheus here as well.


Official LimeWire Website
The english version of the LimeWire website. A not so familiar downloading tool but works properly.


Official Overnet / eDonkey2000 Website
You know e-Bay and e-Mule.....well here's eDonkey 2000. Together on one website with Overnet.


Official Shareaza Website
Find everything you need to know on Shareaza here !


Official Soulseek Website
Soulseek ? Don't know what it is yet. Find out and download here.

Source: http://www.tutorialguide.net/mp3/mp3_download_tools/

14 December 2008

Secure operating systems

One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever. Though still valid, the technology is in limited use today, primarily because it imposes some changes to system management and also because it is not widely understood. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment. An example of such a Computer security policy is the Bell-LaPadula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel. This forms the foundation for a secure operating system which, if certain critical parts are designed and implemented correctly, can ensure the absolute impossibility of penetration by hostile elements. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Ordinary operating systems, on the other hand, lack the features that assure this maximal level of security. The design methodology to produce such secure systems is precise, deterministic and logical.

Systems designed with such methodology represent the state of the art of computer security although products using such security are not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information, military secrets, and the data of international financial institutions. These are very powerful security tools and very few secure operating systems have been certified at the highest level (Orange Book A-1) to operate over the range of "Top Secret" to "unclassified" (including Honeywell SCOMP, USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation, and therefore there are degrees of security strength defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (such as EAL levels), and these are specified in a Protection Profile for requirements and a Security Target for product descriptions. None of these ultra-high assurance secure general purpose operating systems have been produced for decades or certified under the Common Criteria.

In USA parlance, the term High Assurance usually suggests the system has the right security functions that are implemented robustly enough to protect DoD and DoE classified information. Medium assurance suggests it can protect less valuable information, such as income tax information. Secure operating systems designed to meet medium robustness levels of security functionality and assurance have seen wider use within both government and commercial markets. Medium robust systems may provide the same the security functions as high assurance secure operating systems but do so at a lower assurance level (such as Common Criteria levels EAL4 or EAL5). Lower levels mean we can be less certain that the security functions are implemented flawlessly, and therefore less dependable. These systems are found in use on web servers, guards, database servers, and management hosts and are used not only to protect the data stored on these systems but also to provide a high level of protection for network connections and routing services.

Security architecture

Security Architecture can be defined as the design artifacts that describe how the security controls (security countermeasures) are positioned, and how they relate to the overall information technology architecture. These controls serve the purpose to maintain the system's quality attributes, among them confidentiality, integrity, availability, accountability and assurance."[1]. In simpler words, a security architecture is the plan that shows where security measures need to be placed. If the plan describes a specific solution then, prior to building such a plan, one would make a risk analysis. If the plan describes a generic high level design (reference architecture) then the plan should be based on a threat analysis.

Security by design

The technologies of computer security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a computer application, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.

There are several approaches to security in computing, sometimes a combination of approaches is valid:

  1. Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity).
  2. Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example).
  3. Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is computer insecurity).
  4. Trust no software but enforce a security policy with trustworthy mechanisms.

Many systems have unintentionally resulted in the first possibility. Since approach two is expensive and non-deterministic, its use is very limited. Approaches one and three lead to failure. Because approach number four is often based on hardware mechanisms and avoids abstractions and a multiplicity of degrees of freedom, it is more practical. Combinations of approaches two and four are often used in a layered architecture with thin layers of two and thick layers of four.

There are myriad strategies and techniques used to design security systems. There are few, if any, effective strategies to enhance security after design.

One technique enforces the principle of least privilege to great extent, where an entity has only the privileges that are needed for its function. That way even if an attacker gains access to one part of the system, fine-grained security ensures that it is just as difficult for them to access the rest.

Furthermore, by breaking the system up into smaller components, the complexity of individual components is reduced, opening up the possibility of using techniques such as automated theorem proving to prove the correctness of crucial software subsystems. This enables a closed form solution to security that works well when only a single well-characterized property can be isolated as critical, and that property is also assessable to math. Not surprisingly, it is impractical for generalized correctness, which probably cannot even be defined, much less proven. Where formal correctness proofs are not possible, rigorous use of code review and unit testing represent a best-effort approach to make modules secure.

The design should use "defense in depth", where more than one subsystem needs to be violated to compromise the integrity of the system and the information it holds. Defense in depth works when the breaching of one security measure does not provide a platform to facilitate subverting another. Also, the cascading principle acknowledges that several low hurdles does not make a high hurdle. So cascading several weak mechanisms does not provide the safety of a single stronger mechanism.

Subsystems should default to secure settings, and wherever possible should be designed to "fail secure" rather than "fail insecure" (see fail safe for the equivalent in safety engineering). Ideally, a secure system should require a deliberate, conscious, knowledgeable and free decision on the part of legitimate authorities in order to make it insecure.

In addition, security should not be an all or nothing issue. The designers and operators of systems should assume that security breaches are inevitable. Full audit trails should be kept of system activity, so that when a security breach occurs, the mechanism and extent of the breach can be determined. Storing audit trails remotely, where they can only be appended to, can keep intruders from covering their tracks. Finally, full disclosure helps to ensure that when bugs are found the "window of vulnerability" is kept as short as possible.

Early history of security by design

The early Multics operating system was notable for its early emphasis on computer security by design, and Multics was possibly the very first operating system to be designed as a secure system from the ground up. In spite of this, Multics' security was broken, not once, but repeatedly. The strategy was known as 'penetrate and test' and has become widely known as a non-terminating process that fails to produce computer security. This led to further work on computer security that prefigured modern security engineering techniques producing closed form processes that terminate.

Secure coding

If the operating environment is not based on a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible. While such secure operating systems are possible and have been implemented, most commercial systems fall in a 'low security' category because they rely on features not supported by secure operating systems (like portability, et al.). In low security operating environments, applications must be relied on to participate in their own protection. There are 'best effort' secure coding practices that can be followed to make an application more resistant to malicious subversion.

In commercial environments, the majority of software subversion vulnerabilities result from a few known kinds of coding defects. Common software defects include buffer overflows, format string vulnerabilities, integer overflow, and code/command injection.

Some common languages such as C and C++ are vulnerable to all of these defects (see Seacord, "Secure Coding in C and C++"). Other languages, such as Java, are more resistant to some of these defects, but are still prone to code/command injection and other software defects which facilitate subversion.

Recently another bad coding practice has come under scrutiny; dangling pointers. The first known exploit for this particular problem was presented in July 2007. Before this publication the problem was known but considered to be academic and not practically exploitable. [2]

In summary, 'secure coding' can provide significant payback in low security operating environments, and therefore worth the effort. Still there is no known way to provide a reliable degree of subversion resistance with any degree or combination of 'secure coding.'

Capabilities vs. ACLs

Within computer systems, the two fundamental means of enforcing privilege separation are access control lists (ACLs) and capabilities. The semantics of ACLs have been proven to be insecure in many situations (e.g., Confused deputy problem). It has also been shown that ACL's promise of giving access to an object to only one person can never be guaranteed in practice. Both of these problems are resolved by capabilities. This does not mean practical flaws exist in all ACL-based systems, but only that the designers of certain utilities must take responsibility to ensure that they do not introduce flaws.

Unfortunately, for various historical reasons, capabilities have been mostly restricted to research operating systems and commercial OSs still use ACLs. Capabilities can, however, also be implemented at the language level, leading to a style of programming that is essentially a refinement of standard object-oriented design. An open source project in the area is the E language.

First the Plessey System 250 and then Cambridge CAP computer demonstrated the use of capabilities, both in hardware and software, in the 1970s, so this technology is hardly new. A reason for the lack of adoption of capabilities may be that ACLs appeared to offer a 'quick fix' for security without pervasive redesign of the operating system and hardware.

The most secure computers are those not connected to the Internet and shielded from any interference. In the real world, the most security comes from operating systems where security is not an add-on, such as OS/400 from IBM. This almost never shows up in lists of vulnerabilities for good reason. Years may elapse between one problem needing remediation and the next.

A good example of a secure system is EROS. But see also the article on secure operating systems. TrustedBSD is an example of an open source project with a goal, among other things, of building capability functionality into the FreeBSD operating system. Much of the work is already done.

Applications

Computer security is critical in almost any technology-driven industry which operates on computer systems. The issues of computer based systems and addressing their countless vulnerabilities are an integral part of maintaining an operational industry. [3]

In aviation

The aviation industry is especially important when analyzing computer security because the involved risks include expensive equipment and cargo, transportation infrastructure, and human life. Security can be compromised by hardware and software malpractice, human error, and faulty operating environments. Threats that exploit computer vulnerabilities can stem from sabotage, espionage, industrial competition, terrorist attack, mechanical malfunction, and human error. [4]

The consequences of a successful deliberate or inadvertent misuse of a computer system in the aviation industry range from loss of confidentiality to loss of system integrity, which may lead to more serious concerns such as data theft or loss, network and air traffic control outages, which in turn can lead to airport closures, loss of aircraft, loss of passenger life. Military systems that control munitions can pose an even greater risk.

A proper attack does not need to be very high tech or well funded for a power outage at an airport alone can cause repercussions worldwide. [5]. One of the easiest and, arguably, the most difficult to trace security vulnerabilities is achievable by transmitting unauthorized communications over specific radio frequencies. These transmissions may spoof air traffic controllers or simply disrupt communications altogether. These incidents are very common, having altered flight courses of commercial aircraft and caused panic and confusion in the past. Controlling aircraft over oceans is especially dangerous because radar surveillance only extends 175 to 225 miles offshore. Beyond the radar's sight controllers must rely on periodic radio communications with a third party.

Lightning, power fluctuations, surges, brown-outs, blown fuses, and various other power outages instantly disable all computer systems, since they are dependent on electrical source. Other accidental and intentional faults have caused significant disruption of safety critical systems throughout the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety.

Notable system accidents

In 1983, Korean Airlines Flight 007, a Boeing 747 was shot down by Soviet Su-15 jets after a navigation computer malfunction caused the aircraft to steer 185 miles off course into Soviet Union airspace. All 269 passengers were killed. [6]

In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user. [7]

Electromagnetic interference is another threat to computer safety and in 1989, a United States Air Force F-16 jet accidentally dropped a 230 kg bomb in West Georgia after unspecified interference caused the jet's computers to release it. [8]

A similar telecommunications accident also happened in 1994, when two UH-60 Blackhawk helicopters were destroyed by F-15 aircraft in Iraq because the IFF system's encryption system malfunctioned.[citation needed]

Terminology

The following terms used in engineering secure systems are explained below.

  • Firewalls can either be hardware devices or software programs. They provide some protection from online intrusion, but since they allow some applications (e.g. web browsers) to connect to the Internet, they don't protect against some unpatched vulnerabilities in these applications (e.g. lists of known unpatched holes from Secunia and SecurityFocus).
  • Automated theorem proving and other verification tools can enable critical algorithms and code used in secure systems to be mathematically proven to meet their specifications.
  • Thus simple microkernels can be written so that we can be sure they don't contain any bugs: eg EROS and Coyotos.

A bigger OS, capable of providing a standard API like POSIX, can be built on a secure microkernel using small API servers running as normal programs. If one of these API servers has a bug, the kernel and the other servers are not affected: e.g. Hurd or Minix 3.

  • Cryptographic techniques can be used to defend data in transit between systems, reducing the probability that data exchanged between systems can be intercepted or modified.
  • Strong authentication techniques can be used to ensure that communication end-points are who they say they are.

Secure cryptoprocessors can be used to leverage physical security techniques into protecting the security of the computer system.

  • Chain of trust techniques can be used to attempt to ensure that all software loaded has been certified as authentic by the system's designers.
  • Mandatory access control can be used to ensure that privileged access is withdrawn when privileges are revoked. For example, deleting a user account should also stop any processes that are running with that user's privileges.
  • Capability and access control list techniques can be used to ensure privilege separation and mandatory access control. The next sections discuss their use.

Some of the following items may belong to the computer insecurity article:

  • application with known security flaws should not be run. Either leave it turned off until it can be patched or otherwise fixed, or delete it and replace it with some other application. Publicly known flaws are the main entry used by worms to automatically break into a system and then spread to other systems connected to it. The security website Secunia provides a search tool for unpatched known flaws in popular products.
Cryptographic techniques involve transforming information, scrambling it so it becomes unreadable during transmission. The intended recipient can unscramble the message, but eavesdroppers cannot.
  • Backups are a way of securing information; they are another copy of all the important computer files kept in another location. These files are kept on hard disks, CD-Rs, CD-RWs, and tapes. Suggested locations for backups are a fireproof, waterproof, and heat proof safe, or in a separate, offsite location than that in which the original files are contained. Some individuals and companies also keep their backups in safe deposit boxes inside bank vaults. There is also a fourth option, which involves using one of the file hosting services that backs up files over the Internet for both business and individuals.
    • Backups are also important for reasons other than security. Natural disasters, such as earthquakes, hurricanes, or tornadoes, may strike the building where the computer is located. The building can be on fire, or an explosion may occur. There needs to be a recent backup at an alternate secure location, in case of such kind of disaster. Further, it is recommended that the alternate location be placed where the same disaster would not affect both locations. Examples of alternate disaster recovery sites being compromised by the same disaster that affected the primary site include having had a primary site in World Trade Center I and the recovery site in 7 World Trade Center, both of which were destroyed in the 9/11 attack, and having one's primary site and recovery site in the same coastal region, which leads to both being vulnerable to hurricane damage (e.g. primary site in New Orleans and recovery site in Jefferson Parish, both of which were hit by Hurricane Katrina in 2005). The backup media should be moved between the geographic sites in a secure manner, in order to prevent them from being stolen.
  • Firewalls are systems which help protect computers and computer networks from attack and subsequent intrusion by restricting the network traffic which can pass through them, based on a set of system administrator defined rules.
  • Access authorization restricts access to a computer to group of users through the use of authentication systems. These systems can protect either the whole computer - such as through an interactive logon screen - or individual services, such as an FTP server. There are many methods for identifying and authenticating users, such as passwords, identification cards, and, more recently, smart cards and biometric systems.
  • Encryption is used to protect the message from the eyes of others. It can be done in several ways by switching the characters around, replacing characters with others, and even removing characters from the message. These have to be used in combination to make the encryption secure enough, that is to say, sufficiently difficult to crack. Public key encryption is a refined and practical way of doing encryption. It allows for example anyone to write a message for a list of recipients, and only those recipients will be able to read that message.
  • Intrusion-detection systems can scan a network for people that are on the network but who should not be there or are doing things that they should not be doing, for example trying a lot of passwords to gain access to the network.
  • Pinging The ping application can be used by potential crackers to find if an IP address is reachable. If a cracker finds a computer they can try a port scan to detect and attack services on that computer.
  • Social engineering awareness keeps employees aware of the dangers of social engineering and/or having a policy in place to prevent social engineering can reduce successful breaches of the network and servers.
  • Honey pots are computers that are either intentionally or unintentionally left vulnerable to attack by crackers. They can be used to catch crackers or fix vulnerabilities.
Source: http://en.wikipedia.org/wiki/Computer_security

08 December 2008

Tips for Safe Transactions (Buyers & Sellers)

With credit card and identity theft on the rise, it is important that you take steps to ensure you don't become a victim of a fraudulent transaction.

  • Know your buyer or seller and their company background.
  • Ensure phone numbers are valid.
  • Proceed with caution when asked to communicate strictly by email with a new seller.
  • Avoid sending money via wire-transfer when dealing with someone new. Wire transfers have been heavily used as a means to accept money with no intent to ship an item.
  • Do not trust offers that are too good to be true. Be wary of unknown customers grossly overpaying and asking for a refund via another form of payment.
  • Do not enter into deals that involve deceiving other entities or business, as you could fall victim to bribery.
  • Understand the transaction arrangements.
  • Resist pressure to consummate a transaction quickly.
  • Be cautious with free hosted email addresses like hotmail.com and yahoo.com.
  • Keep your personal information safe and secure, and do not to use identical passwords across multiple web sites.
  • Be especially cautious when dealing with buyers or sellers in countries outside of the USA and Canada. LabX has a wonderful base of users outside of North America. Nevertheless, you should ensure that it is legal to trade with the region and products, and that your buyer or seller has a confirmed physical address.
  • Avoid transactions from unknown entities when the billing/shipping address differs from the point of contact.
  • Consider using an escrow service.
  • Let LabX know if you have a problem.
  • Sellers should report suspected fraud to law enforcement agencies.
For more information on Internet fraud, please visit the web sites listed below. Much of our tips have been derived from the wealth of information on these sites:
http://www.ifccfbi.gov
http://www.fraud.org
http://www.nclnet.org

source : http://www.labx.com/v2/aboutlabx/help.cfm?SelectfaqID=1149&TabID=39

29 October 2008

The vulnerability of operating systems to viruses

Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses.

This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. The users of Microsoft software (especially networking software such as Microsoft Outlook and Internet Explorer) are especially vulnerable to the spread of viruses. Microsoft software is targeted by virus writers due to their desktop dominance, and is often criticized for including many errors and holes for virus writers to exploit. Integrated and non-integrated Microsoft applications (such as Microsoft Office) and applications with scripting languages with access to the file system (for example Visual Basic Script (VBS), and applications with networking features) are also particularly vulnerable.

Although Windows is by far the most popular operating system for virus writers, some viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. Some operating systems are less secure than others. Unix-based OS's (and NTFS-aware applications on Windows NT based platforms) only allow their users to run executables within their protected space in their own directories.

An Internet based research revealed that there were cases when people willingly pressed a particular button to download a virus. A security firm F-Secure ran a half year advertising campaign on Google AdWords which said "Is your PC virus-free? Get it infected here!". The result was 409 clicks.[8]

As of 2006, there are relatively few security exploits[9] targeting Mac OS X (with a Unix-based file system and kernel). The number of viruses for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. It is safe to say that Macs are less likely to be targeted because of low market share and thus a Mac-specific virus could only infect a small proportion of computers (making the effort less desirable). Virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising.[10]

Windows and Unix have similar scripting abilities, but while Unix natively blocks normal users from having access to make changes to the operating system environment, older copies of Windows such as Windows 95 and 98 do not. In 1997, when a virus for Linux was released – known as "Bliss" – leading antivirus vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows.[11] The Bliss virus may be considered characteristic of viruses – as opposed to worms – on Unix systems. Bliss requires that the user run it explicitly (so it is a trojan), and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked.[12]

The role of software development

Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits.

Anti-virus software and other preventive measures

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.

Some anti-virus programs are able to scan opened files in addition to sent and received e-mails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.

One may also minimise the damage done by viruses by making regular backups of data (and the Operating Systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). A notable exception to this rule is the Gammima virus, which propagates via infected removable media (specifically flash drives) [13] [14]. If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an Operating System on a bootable can be used to start the computer if the installed Operating Systems become unusable. Another method is to use different Operating Systems on different file systems. A virus is not likely to affect both. Data backups can also be put on different file systems. For example, Linux requires specific software to write to NTFS partitions, so if one does not install such software and uses a separate installation of MS Windows to make the backups on an NTFS partition, the backup should remain safe from any Linux viruses. Likewise, MS Windows can not read file systems like ext3, so if one normally uses MS Windows, the backups can be made on an ext3 partition using a Linux installation.

Recovery methods

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

Virus removal

One possibility on Windows Me, Windows XP and Windows Vista is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files or also exists in previous restore points [15]. Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is CiaDoor.

Administrators have the option to disable such tools from limited users for various reasons. The virus modifies the registry to do the same, except, when the Administrator is controlling the computer, it blocks all users from accessing the tools. When an infected tool activates it gives the message "Task Manager has been disabled by your administrator.", even if the user trying to open the program is the administrator.

Users running a Microsoft operating system can go to Microsoft's website to run a free scan, if they have their 20-digit registration number.

Operating system reinstallation

Reinstalling the operating system is another approach to virus removal. It involves simply reformatting the OS partition and installing the OS from its original media, or imaging the partition with a clean backup image (taken with Ghost or Acronis for example).

This method has the benefits of being simple to do, can be faster than running multiple anti-virus scans, and is guaranteed to remove any malware. Downsides include having to reinstall all other software as well as the operating system. User data can be backed up by booting off of a Live CD or putting the hard drive into another computer and booting from the other computer's operating system (though care must be taken not to transfer the virus to the new computer).

Source from: http://en.wikipedia.org/wiki/Computer_virus


20 September 2008

50 Dangerous Websites


Buat para web surfer agar berhati-hati dalam berselancar di dunia maya, karena banyak sekali websites yang sangat berbahaya buat komputer kita, untuk itu saya tampilkan daftar beberapa websites yang sangat berbahaya dan bisa anda dilihat seperti tampak di atas.

20 August 2008

The Indonesia IT Report

Market Overview

The Indonesian IT market should grow at a CAGR of at least 11% between 2007 and 2012. Computer sales were strong in 2007 despite government moves to crack down on software piracy. By 2011, the hardware-dominated IT market will approach a value of US$5bn as Indonesia displays faster growth than many ASEAN neighbours, despite a number of constraints. With information and communication technology (ICT) penetration of only around 20% and development restricted to richer areas such as Java, Indonesia's uneven development (and resultant digital divide) is a barrier to still faster growth within the potentially huge IT market.

A more active approach by the government, including the establishment of a new committee headed by President Susilo, should stimulate spending through a series of infrastructure and education initiatives. Private enterprises, and particularly SMEs, are expected to dominate PC sales, with ERP and other ebusiness applications also finding increasing popularity. Government spending remains relatively small compared with regional neighbours such as Singapore and India, but a relaxed monetary policy and buoyant economy should help the consumer segment.

Industry Developments

A report by Indonesian computer industry association Apkomindo concludes that tighter application of intellectual property rights with regard to IT products has not had a significant negative effect on computer sales volumes. There are signs that the government is beginning to take the issue more seriously, with millions of US dollars of pirate software seized in raids last year. For 2007, computer sales were estimated by Apkomindo at 851mn units, with any negative effect from higher prices seeming to have been overweighed by companies choosing to exchange computers for legal software. Meanwhile, regional governments are being encouraged to adopt the new institution of a CIO (Chief Information Officer). The Director General of Telematics Applications at the Department of Communications and Information said that the new CIO post was needed in every government institution. According to the government, e-government in Indonesia is still at an early stage. Promoting the new CIO position is being described as key to making e-government 'inseparable' from public service.

Competitive Landscape

Vendors are stepping up initiatives to reach out to the Indonesian SMB segment in a market where enterprises account for 70-80% of all sales in the country. IBM Indonesia recently launched a localversion of its Express IT package, which offers a range of hardware, software and related services to SMBs. Prices range from US$1000 to US$150,000 and the new scheme offers various backup features. IBM Indonesia claims to service around 2,500 SMB clients in various industries. The fast growth of the Indonesian computer market is pushing vendors to focus more on a market which has previously been overshadowed by larger countries in the Asia Pacific region. Indonesia is becoming a more attractive market for leading vendors such as HP and Acer, which have been benefiting from rapid growth in PC sales. The top five vendors dominate the Indonesian market, with Acer the leader in the notebook sector and HP the overall leader. Acer set a target share of 10% of the total market for PCs in 2007. Aside from HP and Acer, other market leaders include Dell, Lenovo and Zyrex.

Computer Sales

Computer sales (including notebooks and peripherals) will be worth an estimated US$1.9bn in full year 2008, according to BMI estimates, up from US$1.7bn in 2007. Notebooks are now growing faster than the PC market as a whole and by 2009 are expected to account for around 20% of annual unit sales. Demand for notebooks is being driven by falling prices as well as smaller and lighter form factors and entertainment and wireless networking features. Prices of both notebooks and desktops are falling with desktop prices now as low as US$400 while notebooks start from around US$700. While the consumer market is only around one quarter of the whole, it is growing fast and has become a growing focus of attention for some vendors. Around one-third of the market is accounted for by non-branded locally assembled PCs.

Software

For 2008, legal software sales are forecast by BMI at US$361mn, up from an estimated US$310mn in 2007, despite the continuing piracy problem. One the key functions of the new Information and Communications Technologies Council founded last year (see Industry Developments) is to address the piracy issue, with Indonesia having one of the worst records in the world in terms of its failure to bring down the piracy rate. IT Minister Sofyan recently commented that the president was concerned with Indonesia's rate of piracy and the fact that it has limited the country's development. The piracy issue lay behind the MoU signed last year between the government and Microsoft. Under the agreement, the government reportedly agreed to purchase 35,496 licensed copies of the MS Windows operating system and 117,480 copies of the MS Office package for a total price of around US$41.9mn. Over the 2007-2012 period, overall software sector CAGR is forecast at 15%.

IT Services

Indonesia's IT services market is expected to be worth US$500mn in 2008, recording year-on-year (y-oy) growth of 14% from US$439 in 2007, based on BMI estimates. Hardware deployment services remainthe largest Indonesian IT services category, with approximately a 20% share. Currently, opportunities are mainly in fundamental services such as system integration, support systems, training, professional services, outsourcing and internet services. Sector CAGR over the 2005-2010 period is expected to be around 13%.

E-Readiness

With an ICT penetration rate of around 20%, only about 14% of Indonesians have internet access currently, translating into around 32mn users. Low telephone line density, high charges and low PC penetration are all significant obstacles. Moreover, research last year indicated that only 42% of those Indonesians with internet access have ever made purchases through the internet. However, the picture is not all bad, as there are signs of faster growth in user numbers, and recent surveys have shown that among a very small elite, there is fast adoption (by regional standards) of broadband and a willingness to pay for video conferencing, security and other additional features. BMI estimated that there were just under 1mn broadband users in 2007, representing a 0.4% penetration rate. The government is encouraging fixed wireless deployments, including WiMax, to bring internet to more remote areas.

The government is also rolling out new e-learning initiatives, attempting to use IT as a means to close the national education gap. The new internet based National Education Network involves one thousand network points in five clusters nationwide and is designed to facilitate the use of internet in schools. Despite some advances in e-education, constraints remains due to poor infrastructure and lack of public awareness in a country where only 20mn people own fixed-line telephones.

Source: http://www.businessmonitor.com/it/indonesia.html



15 July 2008

Daftar Alamat Software Gratisan

Buat anda yang lagi kesusahan mencari alamat2 web yang menyediakan software gratisan bisa di lihat di bawah ini semoga bisa membantu anda yang sedang mencari software2 gratisan, dan inilah nama2 alamat webnya:

1. FreewareFiles.com
http://www.freewarefiles.com
Kamu bisa mendownload software-software gratis seperti game, browser web, screensaver, driver, desktop, spyware, dll.
2. Nonags
http://www.nonags.com
Program freeware lain bebas virus, spyware dan trojan.
3. Freeware Home
http://www.freewarehome.com
Website ini menawarkan software-software gratis dan layanan internet.
4. Free Downloads Center
http://www.freedownloadscenter.com
Website ini menawarkan download software gratis dan shareware, termasuk game, video, program antivirus,wallpaper,perlengkapan bisnis dll.
5. PortableApps.com
http://portableapps.com
Website ini menyediakan software portable gratis untuk USB drive, termasuk Firefox, OpenOffice, Media Player, program antivirus, dll.
6. SofoTex Downloads
http://www.sofotex.com
Menyediakan kumpulan download shareware dan freeware dengan review dan deskripsi pada kategori-kategori seperti PC utilities, games, screen savers, dll.
7. Completely Free Software
http://www.completelyfreesoftware.com
Freeware Windows dan DOS gratis yang telah di test, di review dan dinilai.
8. MyZips.com
http://www.myzips.com
Kumpulan download freeware dan shareware yang bisa kamu cari lewat box pencarinya.
9. Programfiles.com
http://www.programfiles.com
Kumpulan shareware, freeware, demo-demo, game-game dan banyak lagi.
10. FreewareWeb.com
http://www.freewareweb.com
Menawarkan kumpulan download freeware, dan shareware.
11. GameHippo
http://www.gamehippo.com
Kumpulan game PC gratis yang dikategorisasikan untuk windows, tanpa shareware atau demo, semua total gratis.
12. TinyApps.org
http://www.tinapps.org
Kumpulan software gratis yang sangat kecil untuk windows/dos sehingga muat
CD atau bahkan disket 1,44 MB
13. Freeware Guide
http://www.freeware-guide.com
Menyediakan berbagai macam program freeware untuk di download.
14. TopDownloads
http://www.topdownloads.net
Menyediakan berbagai macam game, screen savers, wallpapers, dan lain-lain untuk didownload gratis.
15. Open Universe
http://www.openuniverse.org
Freeware simulator sistem tata surya gratis, 3D. Dengan display planet, bulan, bintang, galaksi, asteroid dan pesawat ruang angkasa.
16. Files32.com
http://www.files32.com
Menawarkan download sharewaare dan freeware dengan fitur pilihan editor, rating pengguna, download terbanyak dan apa yang terbaru.
17. Pricelessware
http://www.pricelessware.org
Kamu bisa mendownload freeware terbaik windows yang telah dinilai dan diuji.
18. ACME Laboratories
http://www.acme.com
Koleksi utiliti dan tools untuk Unix dan Java, tutorial dan sumber-sumbernya, dll.
19. ABF-SOFT.com
http://www.abf-soft.com
Memiliki berbagai macam software program shareware dan freeware.
20. Only Freeware
http://freeware.intrastar.net/
Tidak ada yang lain kecuali freeware gratis disini.
21. SGI
http://www.sgi.com/fun/freeware/games.html
List game-game freeware dengan platform SGI
22. AnalogX
http://www.analogx.com/contents/download.htm
Lebih dari 5000 download gratis untuk windows dengan kategori Audio, Network, Programming dan System
23. DriversHeadquarters
http://www.drivershq.com
Menyediakan daftar lengkap driver yang bisa didownload gratis.
24. Mihov Freeware
http://www.mihov.com/eng/
Isi website ini merupakan campuran program dan grafik/gambar gratis untuk didownload.
26. Driverfiles
http://www.driverfiles.net
Download gratis driver untuk semua device populer atau jarang ada. Juga file DLL
27. Top Quality Freeware
http://www.topqualityfreeware.com
Lebih dari 2 kategori freeware yang bisa didownload termasuk game PC, icon, desktop, themes, grafik/gambar dan utiliti untuk internet.
28. The Free Site
http://www.thefreesite.com/free_software/
Beberapa software gratis yang bisa didownload.
29. Freeware Network
http://www.fwnetwork.com
Database ekstensif utiliti internet, business tools, player video dan audio, grafik desktop, dll.
30. Free Software 4 All
http://www.freesoftware4all.co.uk
Daftar kumpulan download freeware berkualitas.
31. Freeware World Team
http://www.all4you.dk/
Database internasional program freeware, untuk OS windows, dari seluruh dunia.
32. OnlyTheBestFreeware.com
http://www.onlythebestfreeware.com
Freeware desktop, internet, MP3, dan utiliti sistem untuk windows.
33. Free2U.org
http://www.free2u.org
Direktori komprehensif lebih dari 4000 program software.
34. Freeware Download Directory
http://freeware.seekfiles.com
Direktori ini mempunyai program-program gratis MP3, audio, multimedia, grafik, game, manajemen informasi, home dan pendidikan.
35. Top Freeware
http://www.topfreeware.net/
Direktori kumpulan freeware berkualitas
36. A1B2C3 Free computer Software
http://www.a1b2c3.com/free/
Kumpulan freeware ukuran sedang yang dikumpulkan berdasarkan kategori.
37. FreeWR
http://www.freewr.com
Menawarkan pilihan-pilihan software yang berguna dengan kategorisasi yang simpel
38. Kids Freeware
http://kidsfreeware.com/
Freeware khusus anak-anak. Bagus buat belajar dan permainan anak-anak yang sederhana dan menarik.
39. FreewareFind
http://www.freewarefind.com
Situs download freeware yang juga menyediakan newsletter bulanan dan mingguan tentang freeware.
40. Freeware Download Box
http://www.freewarebox.com
Menyediakan banyak kategori program dan link download.
41. Openwares
http://www.openwares.org
Kumpulan software open source yang bisa di download
42. Driver World
http://galttech.com.drivers.shtml
Kumpulan bermacam-macam device driver yang bisa di download.
43. Decent Downloads
http://decentdownloads.x-istence.com
Kumpulan beraneka freeware yang berguna.
44. Boostware
http://www.boostware.com
Kumpulan utiliti freeware untuk mempercepat operasi sistem untuk Linux, MAC, dan windows, dan review pendek untuk setiap produknya.
45. FreewarePro
http://www.freewarepro.com
Kumpulan koleksi freeware yang bisa di download untuk windows
46. DirFile
http://www.dirfile.com
Pusat download software dan freeware, juga ada file PAD.
47. 2-Software
http://www.2-software.net/
Kumpulan Software gratis dan open source.
48. Freeware Beast
http://www.freewarebeast.com
Software dan Game gratis dengan screenshot dan review
49. WebGrid
http://www.webgrid.co.uk
Kumpulan freeware yang sangat banyak
50. Freeware Directory
http://www.freewaredirectory.net
Kumpulan freeware yang dikategorisasikan ke dalam aplikasi, utiliti sistem dan file, permainan, prpgram-program komputer untuk PC, handheld, dan PDA.
51. Scan Complete
http://www.scancomplete.com
Antivirus gratis, spyware dan adware.
52. List of free statistical software
http://statistiksoftware.com/free_software.html
Software statistika gratis untuk semua platform dan dicantumkan juga deskripsi masing-masingnya.
53. Downloads from A to Z
http://www.azdownloads.info
Kumpulan bermacam-macam software termasuk freeware disusun secara alphabetis.
54. Radified Freeware
http://radified.com/articles/freeware.htm
Kumpulan freeware berguna yang sangat simpel.
55. The Free Web Network
http://www.thefreeweb.net/
Kamu bisa mencari software gratis di websitenya untuk semua platform
56. Absolute Freebies
http://www.absolutefreebies.com/best_freeware.html
Website ini berisi tentang berbagai rekomendasi freeware untuk windows gratis dan bisa di download.
57. DigitalArena
http://www.digitalarena.co.uk
Kumpulan software untuk animasi, ilustrasi, desain web, membuat game dan multimedia yang gratis dan shareware.
58. Free-Software-Downloads.org
http://www.free-software-downloads.org/
Kumpulan software gratis dengan hak cipta, dan dikategorisasikan berdasarkan review, kebutuhan OS dan ukuran download.
59. FreewareStop
http://www.freewarestop.org
Freeware internet, ftp, grafis,MP3, ZIP, enkripsi, utiliti sistem, font dan screensaver.
60. GoldFiles
http://www.goldfiles.com
Perpustakaan digital sumber-sumber download dan video game gratis.
61. Best Free Software
http://www.best-free-software.com
Daftar software-software alternatif yang gratis.
62. Afterzed
http://afterzed.com/freeware
Pilihan yang banyak meliputi utiliti, program aplikasi, dan file-file lain yang berhubungan dengan windows.
63. Compufiles
http://www.compufiles.com
Review dan link download ke berbagai program windows.
64. Program Central
http://programcentral.net
Download program freeware dan shareware untuk sistem windows dan linix. Termasuk daftar donwload yang populer lain.
65. Acme widgets and Gadgets
http://www.acmefreeware.com
Koleksi beberapa software windows gratis berdasarkan kategori.
66. My Free Programs
http://www.myfreeprograms.com
Koleksi program gratis yang berkualitas tinggi.
67. Real Free Software
http://www.realfreesoftware.com
Berbagai macam freeware yang dikategorisasikan.
68. Linx2go.topcities.com
http://linx2go.topcities.com
Kumpulan situs-situs software terbaik, termasuk freeware, shareware, desain web, webmaster tools, grafis, template. freebies dan banyak lagi.
69. Good Free Software
http://www.goodfreesoftware.netfirms.com
Kumpulan freeware-freeware baik yang bebas spyware.
70. Datasyndicate
http://www.datasyndicate.com
Kumpulan software-software yang bermacam-macam, termasuk freeware.
71. Freewaresoft.net
http://freewaresoft.net
Blog dengan update-update software baru yang bermacam-macam
72. Zakirium
http://www.zakirium.com
Kumpulan freeware berkualitas.
73. Bitszone.com
http://www.bitszone.com
Kumpulan file download, termasuk freeware yang dikategorisasikan untuk rumah tangga dan bisnis.
74. Freesoft.cc
http://www.freesoft.cc
Software untuk windows, linux dan macintosh
75. Perfect Freeware
http://www.perfectfreeware.com
Koleksi terkategorisasi dan mudah dicari lebih dari 2500 program freeware.
76. GNU Project and Free Software Foundation
http://www.gnu.org
Website ini adalah rumah bagi OS GNU, lisensi publik GNU, dan yayasan software bebas. Freeware-freeware open source bisa didapatkan disini.
77. Driver Guide
http://www.driverguide.com
Database driver-driver berbagai macam device
78. Free Download A Day
http://www.freedownloadaday.com
Blog yang menyediakan aplikasi freeware tiap hari.
79. TSM Soft
http://www.tsm-soft.com
Resource-resource dan screenshot deskripsi dan download untuk windows.
80. John Hood’s Best of Free Software
http://www.jhoodsoft.org
Direktori freeware terbaik termasuk freeware alternatif Microsoft berkualitas.
81. Freeware Library
http://freeware.it-mate.co.uk
Kumpulan freeware dengan screenshot.
82. Micropistoff
http://micropistoff.tomc.org.uk
Alternatif-alternatif gratis untuk produk-produk komersial
83. MusthaveCD.com
http://www.musthavecd.com
Koleksi utiliti gratis penting untuk mengoptimalkan PC
84. Replacements.co.za
http://replacements.co.za
Kumpulan software open source gratis untuk menggantikan software-software yang telah awam.
85. ChipCom.net
http://www.chipcom.net/freeware.php
Daftar tools software untuk web dan utiliti berguna untuk windows dan linux.
86. The DawgHouse Project
http://www.madawg.net
Informasi-informasi dan download aplikasi freeware populer yang beraneka.
87. n01getsout.com
http://www.n01getsout.com
Kumpulan freeware untuk windows dan linux yang bisa menggantikan produk-produk komersial.
88. WebPagesOnly
http://www.freewebtown.com/webpagesonly
Software windows dan pocket PC
89. Perfect Freeware
http://www.perfectfreeware.com
Daftar yang terkategorisasi lebih dari 2500 program freeware.
90. Fix Disk Utilities and Windows Information Database
http://www.fixdisk.co.uk
Utiliti diagnostik dan program fix disk.
91. Forsaken Web
http://www.forsakenweb.com
Screenaver, game dan software-software lainnya.
92. Skan Software
http://www.skan.ru/en/
Kumpulan update program-program populer freeware dan shareware.
93. Soft 2006
http://www.soft2006.com
Kumpulan software open source dan freeware gratis.
94. Simon Lenton Freeware
http://www.simonlenton.i8.com
Direktori program-program freeware yang berguna.
95. SourceForge
http://www.sourceforge.net
Ribuan proyek open source gratis untuk berbagai macam jenis.
96. Freeware Directory
http://freewaredirectory.net
Di website ini lengkap sekali freeware yang terdaftar dan bisa didownload langsung.

Sumber : http://sumber-sumber.blogspot.com, http://www.gratis2.blogspot.com

& http://kamalmisran.wordpress.com

20 February 2008

Pernak-pernik Virus

 " A program that can infect other   programs by     modifying them to  include
a slighty altered copy of itself. A virus can spread throughout a computer
system or network using the authorization of every user using it to infect
their programs. Every programs that gets infected can also act as a virus
that infection grows:: Fred Cohen"

pengantar
-----------------

Apakah Kalian pernah mendengar apa itu virus, tahukah kalian apa yang
dimaksud virus itu disini aku akan coba mengartikan apa itu virus.
virus yang lebih dikenal dalam istilah kedokteran atau arti virus sebagai
biological virusses" inipun ternyata populer juga di dunia yang terdiri dari
elektron ini. hal ini terjadi dikarenakan kemiripan dalam mekanisme
penyebarannya.

Virus komputer bisa diartikan secara gamblang adalah suatu program komputer
biasa. tetapi memiliki perbedaan yang mendasar dengan program-program
lainnya,yaitu dia dibuat untuk menulari program program lainnya, mengubah,
memanipulasinya bahkan sampai merusaknya.

tetapi ada yang perlu dicatat disini, virus hanya akan menulari apabila
program pemicu atau program yang telah terinfeksi tadi dieksekusi,
disinilah perbedaannya dengan "worm". Aku tidak akan mencoba membahas worm
karena nanti akan mengalihkan kita dari pembahasan mengenai virus ini.

asal muasal virus
-----------------

1949, John Von Neuman, menggungkapkan "teori self altering automata"
yang merupakan hasil riset dari para ahli matematika.

1960, lab BELL (AT&T), para ahli di lab BELL (AT&T) mencoba-coba teori yang
diungkapkan oleh john v neuman, mereka bermain-main dengan teori tersebut
untuk suatu jenis permainan/game. Para ahli tersebut membuat program yang
dapat memperbanyak dirinya dan dapat menghancurkan program buatan lawan.
Program yang mampu bertahan dan menghancurkan semua program lain, maka akan
dianggap sebagai pemenangnya. Permainan ini akhirnya menjadi permainan
favorit ditiap-tiap lab komputer.semakin lama mereka pun sadar dan mulai
mewaspadai permainan ini dikarenakan program yang diciptakan makin lama makin
berbahaya, sehingga mereka melakukan pengawasan dan pengamanan yangketat.

1980, program tersebut yang akhirnya dikenal dengan "virus" ini berhasil
menyebar diluar lingkungan laboratorium, dan mulai beredar di dunia cyber.

1980, mulailah dikenal virus virus yang menyebar di dunia cyber.


Jenis-Jenis Virus
-----------------

Untuk lebih mempertajam pengetahuan kita tentang virus, Aku akan coba
memberikan penjelasan tentang jenis jenis virus yang sering berkeliaran
di dunia cyber.

1.Virus Makro
--------------
Aku rasa kita semua sudah sangat sering mendengar tentang virus ini. Virus ini
ditulis dengan bahasa pemrograman dari suatu aplikasi bukan dengan bahasa
pemrograman dari suatu Operating System. Virus ini dapat berjalan apabila
aplikasi pembentuknya dapat berjalan dengan baik, maksudnya jika pada komputer
mac dapat menjalankan aplikasi word maka virus ini bekerja pada komputer
bersistem operasi Mac.
contoh virus:
-variant W97M, misal W97M.Panther panjang 1234 bytes,akanmenginfeksi NORMAL.DOT
dan menginfeksi dokumen apabila dibuka.
-WM.Twno.A;TW :: 41984 bytes, akan menginfeksi Dokumen Ms.Word yang menggunakan
bahasa makro, biasanya berekstensi *.DOT dan *.DOC
-dll

makanya tulisan ini aku gak ketik di word (:p)

2.Virus Boot Sector
--------------------
Virus Boot sector ini sudah umum sekali menyebar (terus terang hardiskku sering
diformat gara gara virus ini :P, tapi karena itu aku sobatan ma dia, :)).
Virus ini dalam menggandakan dirinya akan memindahkan atau menggantikan boot
sector asli dengan program booting virus. Sehingga saat terjadi booting maka
virus akan di load kememori dan selanjutnya virus akan mempunyai kemampuan
mengendalikan hardware standar(ex::monitor, printer dsb) dan dari memori ini
pula virus akan menyebar keseluruh drive yang ada dan terhubung kekomputer
(ex: floopy, drive lain selain c:\)
contoh virus ::
-varian virus wyx (langganan gwa nih :) ex: wyx.C(B) menginfeksi boot record dan
floopy ; panjang :520 bytes; karakteristik : memory resident dan terenkripsi)
-varian V-sign : menginfeksi : Master boot record ; panjang 520 bytes;
karakteristik: menetap di memori (memory resident),terenkripsi, dan polymorphic)
-Stoned.june 4th/ bloody!: menginfeksi : Master boot record dan floopy;
panjang 520 bytes; karakteristik: menetap di memori (memory resident),
terenkripsi dan menampilkan pesan "Bloody!june 4th 1989" stelah komputer
melakukan booting sebanyak 128 kali)

3.Stealth Virus
----------------
Virus ini akan menguasai tabel tabel interupt pada DOS yang sering kita kenal
dengan "Interrupt interceptor" . virus ini berkemampuan untuk mengendaikan
nstruksi instruksi level DOS dan biasanya mereka tersembunyi sesuai namanya
baik secara penuh ataupun ukurannya .
contoh virus:
-Yankee.XPEH.4928, menginfeksi file *.COM dan *.EXE ; panjang 4298 bytes;
karakteristik: menetap di memori, ukuran tersembunyi, memiliki pemicu
-WXYC (yang termasuk kategori boot record pun karena masuk kategri stealth
dimasukkan pula disini), menginfeksi floopy dan motherboot record; panjang
520 bytes;menetap di memori; ukuran dan virus tersembunyi.
-Vmem(s): menginfeksi file file *.EXE, *.SYS, dan *.COM ; panjang fie 3275
bytes; karakteristik:menetap di memori, ukuran tersembunyi, di enkripsi.
-dll

4.Polymorphic Virus
-------------------
Virus ini Dirancang buat mengecoh program antivirus,artinya virus ini selalu
berusaha agar tidak dikenali oleh antivirus dengan cara selalu merubah rubah
strukturnya setiap kali selesai menginfeksi file/program lain.
contoh virus:
-Necropolis A/B, menginfeksi file *.EXE dan *.COM; panjang file 1963 bytes;
karakteristik: menetap di memori, ukuran dan virus tesembunyi,terenkripsi dan
apat berubah ubah struktur
-Nightfall, menginfeksi file *.EXE; panjang file 4554 bytes; karakteristik :
menetap di memori, ukuran dan virus tesembunyi,memiliki pemicu, terenkripsi
dan dapat berubah ubah struktur
-dll

5.Virus File/Program
--------------------
Virus ini menginfeksi file file yang dapat dieksekusi langsung dari sistem operasi,
baik itu file application (*.EXE), maupun *.COm biasanya juga hasil infeksi dari
virus ini dapat diketahui dengan berubahnya ukuran file yang diserangnya.

6.Multi Partition Virus
-----------------------
Virus ini merupakan gabungan dariVirus Boot sector dan Virus file: artinyapekerjaan
yang dilakukan berakibat dua, yaitu dia dapat menginfeksi file file *.EXE dan juga
menginfeksi Boot Sector.

Kriteria Virus
--------------

Suatu virus , dapat dikatakan adalah benar benar virus apabila minimal memiliki 5
kriteria (kriteria ini aku dapatkan dari sebuah sumber terpercaya :))
1.kemampuan suatu virus untuk mendapatkan informasi
2.kemampuannya untuk memeriksa suatu program
3.kemampuannya untuk menggandakan diri dan menularkan
4.kemampuannya melakukan manipulasi
5.kemampuannya untuk menyembunyikan diri.


Sekarang akan aKu coba jelaskan dengan singkat apa yang dimaksud dengan tiap-tiap
kemampuan itu dan mengapa ini sangat diperlukan.

Kemampuan untuk mendapatkan informasi
-------------------------------------
Pada umumnya suatu virus memerlukan daftar nama nama file yang ada dalam suatu
directory, untuk apa? agar dia dapat mengenali program program apa saja yang akan
dia tulari, semisal virus makro yang akan menginfeksi semua file berekstensi *.doc
setelah virus itu menemukannya, disinilah kemampuan mengumpulkan informasi itu
diperlukan agar virus dapat membuat daftar/dat semua file terus memilah dengan
mencari file file yang bisa ditulari. Biasanya data ini tercipta saat program yang
tertular atau terinfeksi atau bahkan program virus ini dieksekusi. Sang virus akan
segera melakukan pengumpulan data dan menaruhnya di RAM (biasanya :P ) ,
sehingga apabila komputer dimatikan semua data hilang tetapi akan tercipta setiap
program bervirus dijalankan biasanya dibuat hidden oleh virus (agar gak keliatan).

Kemampuan memeriksa suat program
--------------------------------
Suatu virus juga sangat amat harus (berlebihan gak ya :P) bisauntuk memeriksa suatu
program yang akan ditulari, misalnya ia bertugas menulari program berekstensi *.doc,
dia harus memeriksa apakah file dokumen ini telah terinfeksi ataupun belum,karena
jika sudah maka dia akan percuma menularinya 2 kali (virus aja perhitungan coba,:)).
Ini sangat berguna untuk meningkatkan kemampuan suatu virus dalam hal kecepatan
menginfeksi suatu file/program.Yang umum dilakukan oleh virus adalah memiliki/memberi
tanda pada file/program yang telah terinfeksi sehingga mudah untuk dikenali oleh
virus tersebut.Contoh penandaan adalah misalnya memberikan suatu byte yang unik
disetiap file yang telah terinfeksi.

Kemampuan untuk menggandakan diri
---------------------------------
Kalo ini emang virus "bang-get", maksudnya tanpa ini tak adalah virus. inti dari
virus adalah kemampuan mengandakan diri dengan cara menulari program lainnya. Suatu
virus apabila telah menemukan calon korbannya (baik file atau program) maka
ia akan mengenalinya dengan memeriksanya,jika belum terinfeksi maka sang virus akan
memulai aksinya untuk menulari dengan cara menuliskan byte pengenal pada program/
file tersebut,dan seterusnya mengcopikan/menulis kode objek virus diatasfile/program
yang diinfeksi. Beberapa cara umum yang dilakukan oleh virus untuk menulari/
menggandakan dirinya adalah:

a.File/Program yanga akan ditulari dihapus atau diubah namanya. kemudian diciptakan
suatu file menggunakan nama itu dengan menggunakan virus tersebut (maksudnya virus
mengganti namanya dengan nama file yang dihapus)
b.Program virus yang sudah di eksekusi/load ke memori akan langsung menulari file
file lain dengancara menumpangi seluruh file/program yang ada.

Kemampuan mengadakan manipulasi
-------------------------------
Rutin (routine) yang dimiliki suatu virus akan dijalankan setelah virus menulari
suatu file/program. isi dari suatu rutin ini dapat beragam mulai dari yang teringan
sampai pengrusakan. rutin ini umumnya digunain buat memanipulasi program ataupun
mempopulerkan pembuatnya! (:P) Rutin ini memanfaatkan kemampuan dari suatu sistem
operasi (Operating System) , sehingga memiliki kemampuan yang sama dengan yang
dimiliki sistem operasi.
misal:
a.Membuat gambar atau pesan pada monitor
b.mengganti/mengubah ubah label dari tiap file,direktori,atau label dari drive di pc
c.memanipulasi program/file yang ditulari
d.merusak program/file
e.Mengacaukan kerja printer , dsb

Kemampuan Menyembunyikan diri
------------------------------
Kemampuan Menyembunyikna diri ini harus dimiliki oleh suatu virus agar semua pekerjaan
baik dari awal sampai berhasilnya penularan dapat terjlaksana.
langkah langkah yang biasa dilakukan adalah:
-Program asli/virus disimpan dalam bentuk kode mesin dan digabung dengan program lain
yang dianggap berguna oleh pemakai.
-Program virus diletakkan pada Boot Record atau track yang jarang diperhatikan oleh
komputer itu sendiri
-Program virus dibuat sependek mungkin, dan hasil file yang diinfeksi tidak berubah
ukurannya
-Virus tidak mengubah keterangan waktu suatu file
-dll

Source From: http://y3dips.echo.or.id/artikel/ez-bagian1_virus.txt