Belajar Menjadi Hacker

. 8.28.2008
0 comments

Hacker dengan keahliannya dapat melihat & memperbaiki kelemahan perangkat lunak di komputer;
biasanya kemudian di publikasikan secara terbuka di Internet agar sistem menjadi lebih baik.
Sialnya, segelintir manusia berhati jahat menggunakan informasi tersebut untuk kejahatan -
mereka biasanya disebut cracker. Pada dasarnya dunia hacker & cracker tidak berbeda dengan dunia seni,disini kita berbicara seni keamanan jaringan Internet.

Saya berharap jadilah Hacker bukan Cracker. Jangan sampai anda terkena karma karena menggunakan ilmu untuk merusak milik orang lain. Apalagi, pada saat ini kebutuhan akan hacker semakin bertambah di Indonesia dengan semakin banyak dotcommers yang ingin IPO di berbagai bursa saham. Nama baik & nilai sebuah dotcom bisa jatuh bahkan menjadi tidak berharga jika dotcom di bobol. Dalam kondisi ini, para hacker di harapkan bisa menjadi konsultan keamanan bagi para dotcommers tersebut - karena SDM pihak
kepolisian & aparat keamanan Indonesia amat sangat lemah & menyedihkan di bidang Teknologi Informasi & Internet. Apa boleh buat cybersquad, cyberpatrol swasta barangkali perlu di budayakan untuk survival dotcommers Indonesia di Internet
Berbagai teknik keamanan jaringan Internet dapat di peroleh secara mudah di Internet antara lain di
http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http://www.linuxdoc.org,
http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/.
Sebagian dari teknik ini berupa buku-buku yang jumlah-nya beberapa ratus halaman yang dapat di ambil
secara cuma-cuma (gratis). Beberapa Frequently Asked Questions (FAQ) tentang keamanan jaringan
bisa diperoleh di http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. Dan bagi
para experimenter beberapa script / program yang sudah jadi dapat diperoleh antara lain di http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html.
Bagi pembaca yang ingin memperoleh ilmu tentang jaringan dapat di download secara cuma-cuma dari
http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf.
Cara paling sederhana untuk melihat kelemahan sistem adalah dengan cara mencari informasi dari berbagai vendor misalnya di http://www.sans.org/newlook/publications/roadmap.htm#3b tentang kelemahan dari sistem yang mereka buat sendiri. Di samping, memonitoring berbagai mailing list di Internet yang berkaitan dengan keamanan jaringan seperti dalam daftar http://www.sans.org/newlook/publications/roadmap.htm#3e.

Read More..

Menjebol password BIOS

.
0 comments

Password BIOS memang sangat berguna untuk melindungi komputer Anda supaya tidak ada orang lain yang dapat mengganti konfigurasi komputer Anda. Tapi password tersebut bisa menjadi malapetaka jika Anda lupa. Nah, jika Anda lupa password BIOS Anda, di bawah ini kami tampilkan default password yang aslinya memang disediakan oleh pembuatnya untuk mengantisipasi kejadian password yang terlupakan. Yang perlu Anda lakukan adalah mencoba satu per satu password tersebut sampai Anda menemukannya :-)

AWARD BIOS
01322222, 589589, 589721, 595595, 598598, 598589, AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%

AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder

PHOENIX
BIOS, CMOS, phoenix, PHOENIX

Password lainnya yang bisa Anda cob
LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj

Read More..

cyber

. 8.12.2008
0 comments

E-, cyber-, and virtual are often used in names coined for “electronic” or computer-related counterparts of a pre-existing product or service. Of the three, virtual is generally considered to be misused in this context.
E-, standing for the word electronic, is used in the terms e-mail (electronic mail), e-commerce (electronic commerce), e-business (“electronic” business), e-banking (electronic banking), and e-book (electronic book). In this way its use (to describe what it follows as the electronic form of an otherwise pre-existing entity) is grammatically and contextually accurate.
Cyber-, derived from cybernetics, is used in the terms cybersex, cyberspace, cyberpunk, cyberhomes and cyberhate, but has been largely surpassed by e-. Cyber- also largely maintains grammatical and contextual accuracy, in that cybernetic denotes control of speech and functional processes. To the extent that it is used in the computer or electronic context to denote control (typically electronic or remote) of the thing represented by the word it precedes, it is used accurately. See, e.g., cyborg under “History”, below. To the extent that cyber- is used to describe entities existing (or events occurring) in cyberspace, its use is arguably accurate as well. However, the term cyberspace (one of the earliest and most widespread uses of the prefix cyber-) was itself one of the least grammatically accurate uses, in that cyberspace is not actual space electronically or remotely controlled. Thus “virtual space” or “virtual universe” would have been a more grammatically accurate term although arguably lacking the existential connotation provided by cyberspace. This connotation gives the term a contextual accuracy and prevents its being lured astray by association with the popular term virtual world, which has a very different and grammatically accurate meaning.
Virtual is correctly used in virtual reality, in that virtual reality simulates reality and in many ways approaches reality. The word virtual means “nearly”, “almost”, or “simulated”. Thus the key to accurate use of virtual as an adjective is that the thing represented by the word virtual modifies must not be the actual or real version of itself. Virtual describes that which approaches or simulates. Virtual reality is not actual reality; hence the label is appropriate. But such erroneous uses as “virtual communication” (for electronic communication) are entirely inaccurate because electronic communication is actual communication; therefore, it is not virtual. It is e-communication. It can even be cyber-communication where typed information is converted to an audio format for the recipient, although arguably that would be e-communication with cyber-speech.
These prefixes are productive. In Straubhaar’s and LaRose’s words, they are “added to almost everything nowadays”. Quinion notes that most of these formations are nonce words that will never be seen again. He observes that coinages such as “e-health” are unneeded, given that it is simply a coinage used to express the application of telecommunications to medicine, for which the name telemedicine already exists. He similarly points out the redundancy of e-tail with e-commerce and e-business. Martin likewise characterizes many of these words as “fad words”, and opines that many of them may disappear once the technology that resulted in their coinage has become better accepted and understood. As an example, he opines that “when using computers becomes the standard way to do business, there will be no need to call it ‘e-business’ — it may be just ‘business’".
There is some confusion over whether these prefixes should be hyphenated or in upper case. In the atypical case of e-mail, CompuServe used Email (capitalized and with no hyphen) from 1981 to 1984 as the trade name for its electronic mail service, but the form of the term has since tended toward that of many other e- terms. Quinion notes that e-mail was originally hyphenated and lowercase, and attributes the forms email, “E-mail”, and “Email” to uncertainty on the parts of newer Internet users who came across e-mail in the 1990s and were uncertain about whether the initial letter was an abbreviation or a prefix. Smith prescribes that the prefix e- should always be lowercase and hyphenated.Other grammarians, particularly descriptive (as opposed to prescriptive) grammarians, disagree. For decades, hyphens have been dropped from formerly-hyphenated words. As the combined meanings become more commonplace and readily understood, the need for hyphens subsides. In 2007 alone, the Oxford English Dictionary dropped approximately 1,600 hyphens, acknowledging that such words and phrases as bumblebee, ice cream, pigeonhole, test tube, and crybaby no longer required them. The hyphen’s short shelf life (formerly shelf-life) is particularly notable in compound nouns, of which e-mail is an abbreviation. If anything, grammatical accuracy would arguably mandate an apostrophe (e’mail) and not a hyphen. But new apostrophes are rare, which may be a result of the widespread misunderstanding of their proper use.

Read More..

Peer

. 8.05.2008
0 comments

New PeeR
Actualy, I don't understand in this articel. But....!. Because he is my friends .So I did him. moderate increased my posting



since this is an estafet award, so the simple rules that have to be followed will be:

1) Put the logo on your blog.

2) Add a link to the person who awarded you.

3) Nominate at least 7 other blogs.

4) Add links to those blogs on yours.

5) Leave a message for your nominees on their blogs.



The person that also must work this peER that is ..... :

1.rieskha

2.Fendik

3.Eka

4.ronni

5.Khalid

6.Andika

7.Prio



I hope you did without copycater to one another... ok

Read More..

cOmEnt frOm thE mAssEs