ANAK BANGSA ADALAH ANAK BANGSA YANG BERKARYA UNTUK BANGSA INDONESIA MENUJU KEJAYAAN YANG ABADI

Senin, 25 April 2011

Presiden Kedua, Soeharto (1966-1998)


Soeharto adalah Presiden kedua Republik Indonesia. Beliau lahir di Kemusuk, Yogyakarta, tanggal 8 Juni 1921. Bapaknya bernama Kertosudiro seorang petani yang juga sebagai pembantu lurah dalam pengairan sawah desa, sedangkan ibunya bernama Sukirah.

Sabtu, 16 April 2011

3 Ways To Choose A WPA Key That’s Difficult To Hack

Wi-Fi is a great way to stay connected to the Internet all over your home without huge wires, and is the only way many devices like the IPad have access to the Internet. Too often users compromise security for convenience and either leave their network open or choose an easy password. Here are three tips to choosing a secure WPA key for your home Wi-Fi network.

1. Avoid Dictionary Words

Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a question of if a hacker can get in but rather when.

Jumat, 15 April 2011

An Introduction To Keyloggers, RATS And Malware

Confucius, one of the greatest Chinese philosophers, said "I listen and I forget. I see and I remember. I do and I understand." And this is exactly the way how this book is presented.

  1. You can read the book and get to know the basics.
  2. You can watch step by step guides and get "inside it".
  3. You can practice everything you've learnt in the book and finally UNDERSTAND it.

And this is why this book is so unique. You can read, you can watch and you can practice every aspect you got to know.

Kamis, 14 April 2011

Hacking School Download Section

Contents outside the responsibility of the team and what we say is as merely a lesson for us wary of Cyber Crime

 Welcome to the Hacking School Download Section. Here you can download all programs presented in the course. You can find your program by pressing CTRL+F. Simply type the word to look for and press ENTER.
Note: The programs are compressed in RAR file format. You need to download a file archiver software, like WinRar or 7-Zip, in order to open the files. You can download WinRar for free from here.


Concept of Hacking


1. Proxy Software

GPass

GPass is a highly advanced software that can encrypt your online data, hide your IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. GPass supports the online applications that you use the most, including Web browsers (e.g. Firefox), multimedia players, email, instant messengers, download managers, and so on.

Hopster

Bypass Firewall - Bypass Proxy - HTTP tunnel Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.
Browse, Surf, Download & Chat Anonymously Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.

M Proxy

This provides proxy solutions, with which you can access the blocked websites and protect your online privacy. You can also get free proxy lists.

Proxy I

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Tor

Tor is free software and an open network that helps you defend against a form of networksurveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.



2. Scanners

Rabu, 13 April 2011

Lock Your Computer With USB Flash Drive

Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

This trick will work on on all versions of windows including both windows 32 bit and 64 bit

Here is the Trick to lock Your Computer With Usb Using Predator

Selasa, 12 April 2011

How to Detect Fake Emails

Yesterday one of my readers asked me about the way to detect a fake mail. I thought that this can become a good point for writing an article. So, I am mentioning some tips to detect fake/fraud/spam mails.

How to Detect Fake Mails:

1. Lets get back to the example I illustrated in my article Fake Mailer. I had used "support@gmail.com" as the sender email address. No doubt, this was fake and the receiver will get the fake email sent by me.

2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details".

3. Something you must know:

Senin, 11 April 2011

How to Activate GodMode In Windows 7 And Vista

If you are using windows vista or windows 7 then you should be aware of Godmode. If you are not aware about the Godmode then in this post I will explain to you what is godmode and how it can be activated in windows 7 and windows vista.

Godmode provides you with a shortcut icon where you can customize all your settings from mouse settings to display settings. This is very convenient as it provides all the options at one single place and activating godmode is also very simple and require only two simple steps.

Here is the Step by Step tutorial with screenshots to Activate godmode in windows 7 and windows Vista

Minggu, 10 April 2011

Biografi Presiden Pertama, Ir. Soekarno (1945-1966)



Presiden pertama Republik Indonesia, Soekarno yang biasa dipanggil Bung Karno, lahir di Blitar, Jawa Timur, 6 Juni 1901 dan meninggal di Jakarta, 21 Juni 1970. Ayahnya bernama Raden Soekemi Sosrodihardjo dan ibunya Ida Ayu Nyoman Rai. Semasa hidupnya, beliau mempunyai tiga istri dan dikaruniai delapan anak. Dari istri Fatmawati mempunyai anak Guntur, Megawati, Rachmawati, Sukmawati dan Guruh. Dari istri Hartini mempunyai Taufan dan Bayu, sedangkan dari istri Ratna Sari Dewi, wanita turunan Jepang bernama asli Naoko Nemoto mempunyai anak Kartika..

Learn How To Mask URL

As we all know, Phishing is one of the most useful and simple methods for hacking email accounts. When sending a phishing mail you have to include the link to your phisher page, so instead of sending mail with actual URL that can create a sense of doubt in victim's mind, we can hide the URL. Dot.tk is an online service which enables you to hide/mask the url.

How to Mask a URL:

Consider you have hosted your phisher page and your phisher link is something like: http://www.facebook.110mb.com