CRITERIA FOR VIRUS

A program can be called as a virus if it meets at least the following five criteria:

     1. The ability to obtain information

     2. The ability to check a file

     3. The ability to replicate and transmit themselves

     4. The ability to manipulate

     5. The ability to hide themselves.

Now it will try to explain briefly what is meant from each ability and why is it

indispensable.

1. The ability to obtain information

In general, a virus requires a list of names of files in a directory. For what? so

he can obtain a list of files that can he tulari. For example, macro viruses that will infect all files

MS Word data, will find a list of files ...

Read more

Sources: ilmukomputer.com
Label:
Origin VIRUS

1949, John von Neumann, menggungkapkan "self-altering automata theory" which is the result of research from the

mathematicians.

1960, Lab BELL (AT & T), experts in the lab BELL (AT & T) dabbled in the theory expressed by John von

Neumann, by making a kind of game / game. They create a program that can reproduce

himself and can destroy the opponent artificial program. Programs that are able to survive and destroy

all other programs, will be deemed the winner. This game eventually became the favorite game in

each computer lab. However, the longer the program that created the more dangerous, so they

conduct strict supervision and security of this game.

1980, the programs that came to be known as the "virus" was successfully spread out

laboratory environment, and begin circulating in public.

Read more

Sources: Ilmukomputer.com
Label:
This time I will share knowledge Hack Hack Facebook Facebook creative experiments of a friend on Facebook a cool site that Lho. As the solidarity of the world share knowledge Underground. Do not admit lo hackers, phishing and scripting kediies kalo aja not know How to Hack Facebook icon wink.
Actually this activity including the level of the lowest-level hackers. If Hack Facebook to evolve into a true hacker, creative and invent something new and share knowledge and personal experience on the way hackers or other layperson.
How to Hack Facebook facebook
Science is no limit and find themselves in a manner masing2 Hack Facebook. Abg actually do not want to if this tutorial abused community. ABG is not responsible for any act of mischief or creative activity you for the abuse of this article. Actually this tutorial is purely as a form of education alone. Hopefully these tips on Hack Facebook you do not become a victim of "creative" abg temen2 virtual world.
See under way to find out how. Conditions of using this technique at least should know how to upload a file to place the file hosting sites and friends / Facebook users pretty common knowledge about computer security. Also use your social engineering. If Hack this trick does not work successfully LWN Hack is probably an expert on computers and maybe even who often work on you with this software. wkwwk. Do not forget to just use a free hosting.
Finally after my searching I found this article. But do not be isengnya. Abang recommend before uploading the file to a hosting site, then you should read first notepadnya file.
suggestions:
1. How to Hack type the website address correctly. Do not have to embel2nya. eg if you get the address of the site http://blockedfacebookaccounts.tk/ -> phishing example (to prove you can access the site, at first glance the site looks the same, but different url address. Beware)
abg phishing've tried the test is 100% just try to access this site:
http://www.sahabatsejati.com/Facebook.htm -> then you input any login id and password is also arbitrary, and press enter
to see your passwords and login id can be accessed at the address
http://www.sahabatsejati.com/FacebookPasswords.htm -> piye cool ngak abg.
Update: just check the results abg How to Hack Facebook, it turns out there who laporin abg work results to the site security. Damn, so it's banned work site abg
2. Be careful if the OL in the cafe, make sure no hack keylogger installed. If forced to enter the site using your login system can use a virtual keyboard softwaee. Simply enter the menu click on Run and typing "OSK" without the quotes. Later will come the digital keyboard. Please login password hack software using the default window.
3. Be careful because there are hackers everywhere
Actually there are lots of How to Hack Facebook phishing scattered in cyberspace, for example, you can also apply phishing on yahoo, gmail, msn, rapidshare, megaupload, etc.. Hopefully with this article can help a little more knowledge of how dangerous phishing sites.
Sources: sahabatsejati.com
Label:
For those of you who like fun ngejahilin friend's computer, ya I love the appropriate tools

for you. ProRat his name. ProRat hacking tool is one of the very outer

very common. Tools are made ​​of Turkey. This tool serves to infiltrate into

someone else's computer. The trick is very simple and easy, we live

know the IP and Port victim's computer, then we can immediately

menginfeksinya.

A. How to use ProRat:

1. First we must know in advance the IP and Port victims

open. We can do it by hand or with the aid

Ports Scanner tool.

Read more

Sources: ilmukomputer.com
Label:
Netcut dan AntiNetcut

Netcut bukan “Netcat” merupakan singkatan dari Network Cut. Network adalah jaringan, sementara cut adalah menggunting (“huh.. semua dah pada tau tuh ” :D ). Jadi kalo kita defenisikan, Netcut berarti menggunting jaringan atau lebih tepatnya lagi memutus hubungan/koneksi. ( ” Trus apa hubungannya sama foto Chucky ?? “).. hehehe.. namanya juga kreasi, dia kan lagi megang gunting.. :D
Biar ngak belit langsung aja ya..
Label:
Download Script Pencuri data secara tersembunyi

Berikut adalah script pencuri data agar data yang anda copy tidak diketaui sang pemilik dikarenakan pengcopyan bekerja di background,untuk menggunakannya sangat mudah,cukup edit bagian lokasi pada file *.bat dengan ekstensi file yang ingin dicuri,misalnya anda ingin mencuri file pada drive D,folder bernama MALING dengan file berekstensi PDF,cukup ganti dengan d:/maling/pdf  ,kemudian save dan jalankan file lain berekstensi *.vbs dengan klik 2 kali,,mudah bukan..hahahay

download
Label:
Kita mungkin setuju bahwa DeepFreeze merupakan salah satu pilihan keamanan populer (terutama di komputer Internet CafĂ©). Seperti halnya sistem keamanan lainnya, semakin populer sebuah aplikasi maka semakin banyak pula orang yang ingin “menguji” ketahanan aplikasi tersebut. DeepFreeze memang “aman” atau setidaknya “pernah aman”, itu istilah saya sendiri; istilah yang saya gunakan untuk menggambarkan keamanan yang pernah berjaya. Sebab, menurut pandangan pribadi saya “tidak ada keamanan yang aman” kecuali keamanan Tuhan.
Label:
Resource Hacker

Resource hacker adalah tool gratis dan dapat digunakan untuk membuka file-file sistem Windows seperti .exe, .dll, .cpl, dsb yang tidak bisa dibuka dengan program biasa. Tool ini dapat digunakan untuk memodifikasi tampilan dari dialog box, menu, dan yang lainnya dalam sistem operasi Windows. Dengan resource hacker kamu bisa menambah/ menghapus/ rename/ memodifikasi source code file sistem Windows.Software ini tidak perlu diinstall atau bersifat portable jadi tidak akan menambah entry di registry. Langsung saja akan saya ulas bagaimana menggunakan software resource hacker. Ketika kamu membuka sebuah file dengan resource hacker maka akan muncul beberapa directory seperi gambar berikut.
Label:
Tera Copy

Tools yang mempercepat proses copy-paste,kecepatan min 1 Mbps,portable sehingga bisa digunakan lewat flashdisk,tak perlu instal..

Download Tera Copy Portable,free..
download
Label:
KAHT2

Billing Hack dengan Kaht

Tool Utama

Tools yang digunakan untuk mendukung aksi kita ini adalah sebuah program yang dinamakan kaht. Program ini digunakan untuk membuka shell target secara remote dengan menggunakan kanal port 135 (itu kalo tidak salah).

Cari Server
Label:
Disini akan disampaikan cara memperbaiki flashdisk yang rusak dengan detail dan disertai tools yang digunakan,,mudah kok,,


Download disini
Label:

You can replace this text by going to "Layout" and then "Page Elements" section. Edit " About "

.

.
Visit the Site
MARVEL and SPIDER-MAN: TM & 2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved. 2007 Sony Pictures Digital Inc. All rights reserved. blogger template by blog forum