Minggu, 20 November 2011

What's Going On


A year ago, I wrote these lyric into my Facebook wall
This lyric was taken from song "What's Going On" by 4 Non Blondes

I felt my situation at the time in every song
When I  was in difficult situation,,
Felt frustrated, confused and depressed..
== ^^ ==

Selasa, 15 November 2011

123 Free Solitaire 2011



123 Free Solitaire 2011 card games collection includes 12 Solitaire Card Games: Diplomat, Eighteens, Flower Garden, FreeCell, Grandfather's Clock, Klondike, Pyramid, Royal Rendezvous, Spider solitaire, Spider Solitaire One Suit, Spider Solitaire Two Suits, and Yukon.

100% Free Chess Board Game for Windows


The King of All Chess Games! Discover a new set of friends with an exciting game of Championship Chess All-Stars! Our 24 realistic characters span across 5 levels of difficulty. Savvy Chess players will love challenging, while Checkers beginners get extra help with our personal in-game DreamCoach(TM). We'll go beyond just showing you what to play, we'll explain why you should play it. Version 7.30 supports Vista and Windows 7, adds new characters, improves artificial intelligence.

Science Without Religion is Lame, Religion Without Science is Blind


"Science without religion is lame, religion without science is blind.” 
(Ilmu Tanpa Agama adalah Lumpuh, Agama Tanpa Ilmu adalah Buta). 

Inilah yang Albert Einstein tulis dalam suratnya kepada filsuf Eric Gutkind, sebagai responnya setelah menerima buku “Choose Life: The Biblical Call to Revolt”. Surat itu ditulis pada 3 Januari 1954, di Jerman, dan menjelaskan keyakinan pribadi Einstein tentang agama dan orang-orang Yahudi.

Einstein memang Atheist, sekalipun dia tidak terlalu suka disebut sebagai seorang Atheist. Religion bagi scientist menurut Einstein adalah  keyakinannya untuk bergelut dalam hidupnya mencari pengertian dan  kebenaran  dari fenomena yang ada di alam ini.  Kekaguman yang luar biasa terhadap harmoni alam dan hukum alam, liberated himself from his selfish desire and cling to their superpersonal value.  Ini semua adalah religious feeling dari seorang scientist. Dia juga menyebutnya sebagai cosmic religion.  Dalam religion ini no dogmas, no Personal God, no Church.

Disguise as GoogleBot to view Hidden Content of a Website

Tags

Ever experienced this? You ask Google to search something and it will return a lot of relevant results, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first. This means that Google is able to see what a normal netizen cannot see.

Senin, 14 November 2011

A4DeskPro Flash Website Builder

Tags

A4DeskPro Flash Website Builder is a powerful, easy to use, all-in-one flash website builder software for Microsoft® Windows 98/NT/XP/Vista users. Create your own websites, resume and presentations in just a few clicks. Deliver stunning flash animation and colors with multiple menus and sub-menus. Absolutely no programming knowledge needed!

Zuma Revenge Full Version


The world's most popular ball-blasting action game is back with a vengeance! Survive a newly evolved world of Zuma, where evil tiki bosses rule the land! Fire spheres to make matches, destroy the deadly stream of balls, and battle six imposing bosses. 

Slide and hop for sharper shots, and score explosive power-ups. Will you succumb to the perilous pitfalls, or can you conquer this ball-blasting challenge? Now with Peggle included! Ready aim bounce! Clear the orange pegs from 55 fanciful levels as 10 whimsical teachers guide you toward Peggle greatness.

Internet Denial Of Service - Attack and Defense Mechanisms



Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.

Ebook : Hacking Exposed 6 - Network Security Secrets & Solutions


"Hackers Are Not Highly Intelligent People, but Only Intelligent People Can be Good Hacker"

One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack.

This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials.

There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.

Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

Download Now

Baguslah Kalo Diremehkan


Pernahkah kawan merasa diremehkan?
Dianggap 'kecil' tanpa guna?

Gw sering, dari dulu.. dan mungkin sampai sekarang ini.

Cerita lalu,
Gw dianggap gak bisa melakukan segala sesuatu dengan benar (menurut pandangan mereka)
Dianggap salah, ketika gw coba pertahanin suatu keyakinan gw.
Atau dianggap melakukan suatu tindakan bodoh di luar jalur pemikiran mereka.

Tiap kata, sikap maupun cibiran mereka pelan" tenggelam dengan sendirinya
Kepongahan mereka karam, ketika satu persatu hal yang mereka remehkan dapat dibuktikan.
dan kemudian, mereka sibuk menelan ludah mereka sendiri.

Kalo hari ini kembali diri ini merasa diremehkan,
Baguslah !!

Semakin diremehkan, semakin pula kalian membakar potensi gw tuk buktikan
Seribu kesulitan, tantangan ataupun kemustahilan ndak bakal bikin nyali gw ciut
toh pada nantinya, dahi" kalian sendiri yang mengerut !

Maksudnya Apa?

Wew.. konfirmasi kek kalo mo bepergian..
Kalo kayak gini caranya, sama aja g nganggep gw

Inikah harga yang pantas untuk sebuah loyalitas?
Tanya Kenapa !

Etichal Hacking Ebook - EC-Council Exam 312-50 : Student Courseware

EC-Council E-Business Certification Series
Copyright © by EC-Council
Developer - Thomas Mathew
Publisher - OSB Publisher
ISBN No - 0972936211

By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide provides the tools necessary for approaching computers with the skill and understanding of an outside hacker.

Introduction:This module attempts to bridge various aspects of ethical hacking by suggesting an approach for undertaking penetration testing. There are different ways of approaching a penetration test.
 
External Approach
With some prior knowledge 
Without prior knowledge
Internal Approach
With some prior knowledge
With deep knowledge

Whatever the approach adopted, it is a fact that penetration testing is constrained by time and availability of resources, which varies from client to client. To effectively utilize both these telling factors, penetration testers adopt some form of structure or methodology. These can be checklists developed by consulting practices, widely available resources such as Open Source Security Testing Methodology or a customized attack strategy.

There are is no single set of methodology that can be adopted across client organizations. The skeletal frame of testing however is more or less similar. The terms of reference used for various phases may differ, but the essence is the same. As discussed in preceding modules, the test begins with:

Footprinting / Information Gathering phase
Discovery and Planning / Information Analysis phase
Detecting a vulnerability / security loophole
Attack / Penetration / Compromise
Analysis of security posture / Cover up / Report
Clean up

The general objective of a penetration test is to reveal where security fails. The result of a penetration test can be:
successful attack - when the objective is met within the scope of the attack
a partial success - when there has been a compromise, but not enough to achieve the objective
a failure - when the systems have been found to be robust to the attack methodology adopted

Foot printing / Information Gathering phase:
Client site intelligence
Infrastructure fingerprinting
Network discovery and Access point discovery

Discovery and Planning / Information Analysis phase:
Target Identification
Resource and Effort Estimation
Modeling the Attack strategy (s)
Relationship Analysis

Detecting a vulnerability / security loophole:
Vulnerability Analysis
Scanning
Enumeration
Zeroing the target

Attack / Penetration / Compromise
Exploring viable exploits (new / created / present)
Executing the attack / Alternate attack strategy
Target penetration
Escalating the attack

Analysis of security posture / Cover up / Report
Consolidation of attack information
Analysis and recommendations
Presentation and deliverables

Clean up
Clean up tasks and procedures
Restoring security posture

Download :
EC-Council Exam 312-50 : Student Courseware

Ebook : XSS Attack - Cross Site Scripting Exploits and Defense


PUBLISHED BY- Syngress Publishing, Inc. ISBN-10: 1-59749-154-3
ISBN-13: 978-1-59749-154-9

This book is all about XSS. It will cover these topics on XSS.

Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks

Download: Ebook XSS Attack

BackTrack 5 R1


Backtrack-linux.org  has released BackTrack 5 R1. BackTrack 5 R1 contains over 120 bug fixes, 30 new tools and 70 tool updates.The kernel was updated to 2.6.39.4 and includes the relevant injection patches.


About Backtrack
BackTrack is a very popular Live DVD Linux distribution that focuses on system and network penetration testing, featuring analysis and diagnostic applications that can be run right from the CD. BackTrack emerged from Whax and Auditor Security Collection distributions, using what was best from both in one complete solution.

According to the guys at OffSec, This release is their best one yet! Some pesky issues such as rfkill in VMWare with rtl8187 issues have been fixed, which provides for a much more solid experience with BackTrack.We’ve have Gnome and KDE ISO images for 32 and 64 bit (no arm this release), as well as a VMWare image of a 32 bit Gnome install, with VMWare Tools pre-installed.We are mighty excited and are already downloading this release just as we speak!


Download BackTrack 5 R1

Android Facial Recognition Unlock Can be Hacked Using Digital Photo

 
Android facial recognition Unlock feature can be hacked using digital photo.  Google Android provide feature "Ice Cream Sandwich" that unlock a phone via Facial recognition.

A blogger showed the facial recognition technology can be fooled if it is presented with a digital picture.

"While some of you think that it is a trick and I had set the Galaxy Nexus up to recognise the picture, I assure you that the device was set up to recognise my face. I have a few people there watching me do the video and if any one of them is watching this video I hope you can confirm that this test is 100% legit," he said in a YouTube video.

It is going to be work if the attacker has your digital photo.   Thief can't recognize whose phone is ,so he can't be unlock it.

Demo :


#Anonymous : Now is the Time to evolve or Die



Anonymous was formed and birthed on the internet message board 4chan in 2003. The moniker Anonymous was derived as homage to 4chan. At the time, if someone posted to 4chan’s forums and no name was given then the post was credited to "Anonymous". Seizing onto the premise or the idea that actions can be taken anonymously by the lesser or powerless “Anonymous” moved beyond 4Chan and morphed into sometime larger and more potent. The original premise of “Anonymous” appeared to be a limited but noble idea; attempting to keep the internet open and free because governments and corporations were earnestly trying and demanding limits and restrictions to the freedom of expression on the internet.

To date “Anonymous” has remained a banner that many channers, as well as hacktivists and IRC users, post under and are loosely grouped together. Allied under the umbrella of “Anonymous” with no real command structure in the group, “Anonymous” remains an ever fluctuating mass of unknown identities that have often fancied themselves as cyber-avengers unfocused and more often than not unable to remain of the same consciousness even on an hourly basis.

History must be remembered and never forgotten, for the factual words of Italian fascist Benito Mussolini was stated correctly; “Fascism is Corporatism”.

As the gap in wages world wide become increasingly more disparaging a significantly increasing numbers of world citizens are being harmed and maltreated by the unquenchable greed and corruption of the evolving corporate state. As the wealth of the world has rapidly been consolidated into the hands of a small minority, governments are being bought and paid for and rapidly, one by one, turned over lock stock and barrel to faceless Corporations. These greed drive soulless concerns have not hesitated to use their power as an instrument of war as a means of increasing their power and profits. Sadly, as expected along with this ever grown trend it has become a fact that human rights violations are becoming even more extreme and cruel.

Since it is evident that the monstrous Corporations committing these unspeakable crimes are almost never held accountable, it is time that the young and the computer literate around the world educate themselves and become consciously aware which greedy Corporations are committing the horrendous crimes that effects the very survival of this planet and every living being on it. Because information is power, inform yourselves. Now is the time to educate yourselves and make your lists of these offenders!

By becoming more educated and informed on the global threat posed by corporations, is it possible that this idea, this premise of “Anonymous” could be channeled into the kind of tool needed to awaken global consciousness to the treachery of the global power structure. Could the true center of “Anonymous” that idea that “Anonymous” wishes to represent the truth to the world morph once more beyond its present form and limitations or will the nebulous vision behind the premise of “Anonymous” remain content to use their collective abilities for either good or bad simply content on a myopic and undisciplined path, depending on the inclination of the mob?

It is time to get off that fluffy cloud of illusion, get educated and get informed beyond such a small focus. Investigate the bigger picture, know your own power; inform others of the immediate threat of corporations and the growing take over of world governments, the biggest and baddest being taken over by fascism today is the United States of America. Internet freedom is the least of your worries now. Call it what you will, this is what Benito Mussolini correctly labeled Fascism my brothers. If you don't like it, you can oppose it. But if you ignore it and deny it; then you will remain a sitting target. “Now is the time to evolve or die”


~thehackernews.com~

Operation Brotherhood Shutdown : Multiple Sites Taken Down by Anonymous Hackers


Anonymous Hackers take down the The Muslim Brotherhood websites. The hacking group had made an announcement Tuesday in which they threatened to launch “Operation Brotherhood Takedown,” on all Brotherhood sites at 8pm on Friday, 11 November.

According to a video released by them on youtube as shown above. They claim to taken down following sites:


As of 2:24 PM EST, ikhwanonline.com IS DOWN.
As of 2:26 PM EST, ikhwanweb.com IS DOWN.

The Brotherhood claimed in a statement released on Saturday morning that the attacks were coming from Germany, France, Slovakia and San Francisco in the US, with 2000-6000 hits per second. The hackers later escalated their attack on the site to 380 thousand hits per second.Under the overload, four of the group’s websites were forced down temporarily.Anonymous is made up of a group of unidentified hackers who have previously attacked Israeli, Russian and NATO sites.

"...Therefore, Anonymous has decided to destroy the Muslim Brotherhood. We shall proceed to dismantle any form of its organization from the internet. Nothing will stop us. We will show no mercy."

Complete Press Release:
Citizens of the World,   
We are Anonymous. 

Ever since its revolution that shook the world, Egypt has had its fate undecided. Predators who seek to control are waiting to strike at the right moment. They are waiting to take over the country and make it so that another revolution is impossible. We cannot allow this. 
The Muslim Brotherhood has become a threat to the revolution Egyptians had fought for, some with their lives. They seek to destroy the sovereignty of the people of Egypt as well as other nations including the United States. 
The Muslim Brotherhood started as a benevolent group of people with fair and just intentions. However, as decades went by, corruption seized its mission of good and turned it into a power-hungry organization bent on taking over soverign arab states in its quest to seize power from them. They say this is necessary in order to unify the muslim nations into one islamic state, which is a lie. 
We will not allow this to happen. 
Their tactics are very similar to tactics used by the Church of Scientology and ideas implemented in Freemasonry. A person may join only when presented in front of the Grand Master, or the Murshid, and is ordered to adhere to a solemn vow, to follow all orders of the Murshid, without hesitation. They claim to be anti-freemasonry, however they follow distinct principles taken from it. If you were to leave the Brotherhood or present any threat to it, they would take it to offense and begin to intimidate you and put your life as well as your loved ones in danger. This has been experienced by many former followers of the Brotherhood, including citizens in the United States and Great Britain who realized they made a terrible mistake. The Muslim Brotherhood is a threat that must be dealt with. 
To those listening now, this is not a threat towards the religion of Islam. The Muslim Brotherhood, as well as terrorist organizations affiliating with the religion, defiled and destroyed the very essence of what the religion preaches. Therefore, the Muslim Brotherhood does not represent the true ideas of Islam. In our collective, many of us are Muslim, yet we fight against the corruption in society and the injustice that comes with it. 
Infused with its blatant, corrupt ways, the Brotherhood is now a threat to the people. 
Therefore, Anonymous has decided to destroy the Muslim Brotherhood. We shall proceed to dismantle any form of its organization from the internet. Nothing will stop us. We will show no mercy.  
Operation Brotherhood Takedown, engaged.
We are Anonymous.We are Legion.We do not Forgive.We do not Forget.Expect Us.
 ~thehackernews.com~

Source Code of ZeuS Botnet Version: 2.0.8.9


 Source Code of ZeuS Botnet Version: 2.0.8.9 from thehackernews.com

Download Now | RAR Password : zeus

‎The Hacker News Magazine - Social Engineering Edition - Issue 02


‎'The Hacker News' Magazine - Social Engineering Edition - Issue 02

Sabtu, 12 November 2011

10 Tips to Secure Your Joomla Site

Tags

Joomla is undoubtedly one of the best CMS available in the market. As more and more websites have started using Joomla, its important that the site is configured properly to prevent any security compromises. I have compiled 10 security tips to secure your joomla website.

1. Proper Hosting Environment
A properly configured server is highly recommended for your joomla website. Host your site on a server that runs PHP in CGI mode with su_php. This means that PHP runs under your own account user instead of the global Apache user and you don’t need to set insecure global permissions like CHMOD of 777.
a. Set register_globals OFF
b. Disable allow_url_fopen
c. Adjust the magic_quotes_gpc directive as needed for your site. The recommended setting for Joomla! 1.0.x is ON to protect against poorly-written extensions. Joomla! 1.5 ignores this setting and works fine either way.
d. Don’t use PHP safe_mode
2. Change the Default Database Prefix (jos_)
While installation, change the default database prefix to something random. This will prevent most of the SQL injection attacks as hackers try to retrive superadmin details from jos_users table.

3. Disable FTP Layer
While installation, dont enable the FTP layer as it opens up a potential security hole since your FTP details are stored in plain text under a Joomla! configuration file. FTP layer is not required if your hosting is secured and configured properly for Joomla.

4. Change superadministrator username
After installation, change the username for the super-administrator. By default, its admin. So change it something like ravi.chamria so that the username/password combination becomes difficult to guess or crack.

5. Strong password
Always use strong password for the administrator accounts. An example of strong password is E@^M!$<9@k. You can use sites like www.strongpasswordgenerator.com to generate a strong password.
A good addition is to password protect the administrator folder. In apache web server, you can do this htaccess file or in cpanel, you can use Password Protected Directory option to setup a password. This will add another layer of username/password before someone reaches your Joomla admin details. Needless to say, have this password different from Joomla admin password.

6. Enable SEF URLs
Most hackers use the Google inurl: command to search for a vulnerable exploit. So enable SEF urls from site configuration if you are using Joomla 1.5. You can also use extensions like SH404SEF for both Joomla 1.0 and Joomla 1.5. This will prevent hackers from finding the exploits as well as benefit you in SEO perspective.

7. Upgrade to latest release of Joomla
Always upgrade to the latest release of Joomla as soon as possible. Always download Joomla! from official sites, such as the Joomla! Forge, and check the MD5 hash

8 Third party extensions
There are more than 4000 extensions available for Joomla many of which are non-commercial. But dont take this as an opportunity to install unnecessary extensions on your website. Remember that most hacking attempts occur due to vulnerability in these extensions. So, always use extensions which are popular, has strong community backing and development process.

9. Proper file/folder permissions
The proper file/folder permissions for your joomla website is:
* PHP files: 644
* Config files: 666
* Other folders: 755
You can CHMOD the files and folders using your FTP client.

10. Setup a backup and recovery process
Always rely on a strong backup and recovery protocol for your live website. Its not just hacking that may compromise your website but other factors like a faulty upgrade or extension install, hardware failure, hosting provider issues. You can use JoomlaPack, a non-commercial component native for both Joomla 1.0 and 1.5 for backup.

Secure Your Joomla Before They Are Hacked

Tags

I have some tips to secure your Joomla website.


* Follow the Joomla Administrator's Security Checklist
The guys at joomla.org have put together a Joomla Administrator's Security Checklist - use it and secure your Joomla site as much as possible using the guidelines.

* Install the jSecure Authentication plugin
Every Joomla back-end has the same URL. If you install a security plugin, you can add a suffix to your back-end URL to make it look like this: http://www.yoursite.com/administrator?helloworld
If the URL is not entered with a correct suffix, the site will redirect to a 404 (not found) page. Change the suffix regularly. The plug-in is $4.99 and it's worth it!
Buy and download the jSecure Authentication plugin here

* Don't use the jos_ prefix
The standard prefix for Joomla tables are jos_. However, many security exploits rely on your database tables being called jos_XXXXXX.
By simply using your own prefix you would have been protected from these exploits.
It should also be unique for every site.
Read more about this over at the blog of Brian Teeman.

* Change your admin user
The default ID for the admin user in Joomla is always 62, and this may be used by a hacker. To avoid this, do the following:
# Create a new super-administrator with another user name and a strong password
# Log out and in again as this new user
# Change the original admin user to a manager and save (you are not allowed to delete a super-administrator).
# Now, delete the original admin user (user ID 62).
* Create a unique passwords from a combination of upper- and lowercase letters, numbers and symbols. For instance WsHc3_#7
Use an Online Password Generator to make the process easier.

* Change your username and password often At least every 3 months.

* Don't use the root user in mySQL as the user of your database
You should always create a new database user when installing a new site, and give rights to the new database only. This way, the user will only have access to the specific site. If not, you can have one site hacked and the rest are wide open as well...

* Always update to the latest Joomla version

Free Joomla Template : CloudAccess 2.0

Tags

CloudBase 2.0 is an advanced template created by CloudAccess.net. It's based on Gantry Framework developed by RocketTheme.

Features :
Additional features we created on top of those Gantry offers:
* 11 template presets (color variations),
* 10 background patterns,
* One of the most advanced system of picking colors for each template element,
* improved "Scroll to top" feature,
* Equal height for modules,
* 60 module positions.

Gantry features:
* 960 Grid System (http://960.gs) for simple consistent layout. 12 and 16 column support
* Per-menu control over all Gantry functionality
* Ability to save/remove custom presets
* Built-in AJAX Support
* iPhone and iPod Touch mobile autotheme support
* Built-in Gantry RokGZipper to compress and combine Gantry JS and CSS files
* Cleaner more understandable index.php.
* Flexibility to configure up to 6 modules in row position.
* 36 possible combinations for the layout of the mainbody/sidebars alone!
* Flexibility to configure different grid-size layouts based on number of published modules. You are not forced to use the same grid layout for every page
* 12 built-in Gantry Features like Logo, font-sizer, to-top smooth slider.
* Ability to force module display and 'blank' module positions for advanced module placement ability.
* Stunning new Admin interface providing better usability and control.
* Unique Layout controls allow you to configure your layout without having to do math.
* Layout controls provide visual representation of your front-end layout for simple and intuitive customization.
* Gantry is XML driven, adding another row of completely flexible module positions is as simple as editing one XML file.
* New flexible parameter system allows loading preset theme attributes and modifying for a custom design.
* All new table-less HTML overrides based on the excellent GNU/GPLv2 overrides from YOOtheme (http://www.yootheme.com)
* New standard typography and Joomla core elements styling
* New advanced caching system makes using Gantry really fast!
* All configuration state is stored in params.ini and cached for speed.
* Optimized codebase with speed, size, and reuse core tenants of the framework design


sigplus Image Gallery Plus : Joomla Extensons

Tags


Description :

sigplus Image Gallery Plus or (sigplus in short) is a straightforward way to add image galleries to an article with a simple syntax. The galleries exhibit the well-known lightbox effect: when a thumbnail is clicked, the corresponding image appears in a pop-up window overlay, without navigating away from the current page.

The plug-in implements features that are usually found only in image gallery Joomla plug-ins that are either commercial or require paid club membership. sigplus ships with all features included, there is no upgrade to a commercial professional version.

Features :
* user-selectable pop-up window engine, including popular Slimbox, prettyPhoto, FancyBox and boxplus (specifically designed for sigplus)
* user-selectable image slider/carousel/rotator
* free-flow and grid layout mode; row, column and grid arrangement
* support for image types .jpg, .png and .gif (with and without transparency)
* best-fit thumbnail generation with automatic cropping and centering
* progressive load feature to save network bandwidth [≥1.3]: only those images are fetched from the server that are being shown
* multiple galleries per content item and per page
* multilingual, search engine-friendly image labels and more verbose description set globally and for each individual image
* right-to-left language support
* download option to save high-resolution image version
* image metadata processing; IPTC data extraction
* custom styling (preview image margin, border, padding and opacity, slide duration and animation delay)
* custom sort criteria (user-defined, file name, last modification time and random order)
* large gallery support (100 or more images in a single gallery) [≥1.3]
* 100% CSS and JavaScript, valid XHTML 1.0 and 1.1, passes WCAG v2 AAA automatic validation (when using labels file)
* default global settings for the entire site and local parameter overrides for individual galleries
* restricted-access galleries and more...

DEMO | DOWNLOADHOMEPAGE |

Kamis, 10 November 2011

Comodo Dragon Browser v.15



Why switch to the Comodo Dragon Internet Browser?

As we begin the second decade of the 21st Century, few would argue the point that the Web has grown up. The fact is today, the Internet is the world's foremost communicative medium. Each day, the volume of messages it transmits, the tidal wave of credentials, ID numbers and passwords it requires, the preponderance of data it exhibits, and the endless array of transactions it helps consummate is unsurpassed!

So there has never been a more appropriate time to answer every Web user's need for a swifter, more versatile and more stable Browser. And the recent launch of Google Chrome has gone a long way toward fulfilling this need. Except for one thing.

Today's Web users require MORE than a Browser that is faster, nimbler and more stable. They need one that is secure too! In 2009 alone, more than 25 million new strains of malware were created, causing a 400% jump in compromised Web sites worldwide.

This is exactly why Comodo, the world's leading online security and trust assurance innovator, has stepped forward with Comodo Dragon. – A Chromium technology-based Browser that offers you all of Chrome's features PLUS the unparalleled level of security and privacy you only get from Comodo. Including a greater level of privacy than Chromium technology offers.

Yes, the Internet has grown up. But the sophistication of millions of hackers, scammers, phishers and thieves has grown too. Which all makes Comodo Dragon THE Browser to have in the second decade of the twenty-first century.


Comodo Dragon Security:
*Has privacy enhancements that surpass those in Chromium's technology
*Has Domain Validation technology that identifies and segregates superior SSL certificates from inferior ones
*Stops cookies and other Web spies
*Prevents all Browser download tracking to ensure your privacy


What's the difference between Google Chrome and Comodo Dragon?
The Dragon encompasses all of the best features of Chrome. It includes an important feature every user needs to use the Internet in total safety today. – Strong security and privacy.

What makes Comodo Dragon better?
Chromium technology was engineered to offer Web users an Internet Browser that surpassed Firefox, Opera, Safari and Internet Explorer. Especially when it comes to functional speed, stability and convenience. Comodo Dragon includes stronger security features.


Features:
Improved Privacy over Chromium
Easy SSL Certificate Identification
Fast Website Access
Greater Stability and Less Memory Bloat
Incognito Mode Stops Cookies, Improves Privacy
Very easy to switch from your Browser to the Dragon

Angry Birds Seasons v.2.0 Full Version


Sebagai salah satu game yang sedang populer di seluruh dunia, Angry Bird kini merilis "Angry Birds Seasons v.2.0" yang bisa dimainkan pada komputer kita. Dalam versi ini, Angry Birds bertemakan Hallowen ala Barat dan China dan memiliki kurang lebih 95 misi untuk dimainkan.



Cara Instalasi :

1. Instal file setup nya
2. Copy & Paste The crack File ( C:\Program Files\Rovio\Angry Birds Seasons ).
3. Run the game & insert serial 8695-2273-2601
4. Enjoy...!!!

Download Angry Birds Seasons v.2.0 Full Version 

Template Joomla Gratis : CloudBase from CloudAccess.net

Tags

CloudAccess.net berbagi template joomla versi 1.5 dan 1.7 secara gratis. Sekalipun gratis, template"nya cukup keren dan mudah untuk dimodifikasi karena ragam penempatan bagi module" yang nantinya akan dipasang.

Sedikit reviews dari vendornya :
Joomla! templates are a great way to jumpstart your site's look and feel for little or no cost. CloudAccess.net provides a variety of both commercial and free Joomla! templates. Check back often as we continue to add more templates. Please note as templates are delivered electronically we do not offer refunds on template purchases for any reason. Please be sure to review your purchase carefully.

PLEASE NOTE: Joomla! 1.5 templates DO NOT work with Joomla! 1.7. Be sure the Joomla! template you purchase includes the correct version if you are using Joomla! 1.7
 Pada postingan ini, saya akan berbagi template dari cloudaccess.net yang bernama 'CloudBase'


Yes, you can have a website that is both beautiful and easy to manage. Joomla! templates are a great way to jumpstart your site's look and feel. CloudAccess.net’s new Joomla 1.5 template, CloudBase, provides you with a instant way to get your business online and looking good.

CloudBase is free and comes with a selection of pre-built themes, 32 modules positions, 5 menu options, iPhone and handheld support, and lots more. Delivered with the Adobe .PSD source file.

    * 100% CSS-based, tableless design
    * 8 color versions
    * 32 module positions
    * Based on T3 framework
    * 5 menu options: Split menu, CSS menu, Dropline menu, Mega menu, Moo Menu
    * Amazing Mega Menu allows you to use modules inside a menu
    * Native iPhone & handheld optimization and style support
    * Improved style for core Joomla! system pages
    * Modules suffixes built into template for module styling
    * Lightweight, modern, very fast-loading design
    * SEO Ultimate - Content first, content on the top
    * Right to left language support
    * Joomla 1.5 native
    * W3C XHTML 1.0 Transitional Valid
    * Fully compatible with: IE7+, Firefox 2+, Firefox 3, Safari, Opera 9.5, Chrome
    * Delivered with Adobe .PSD source file

LIVE DEMO | DOWNLOAD | INSTRUCTIONS
 

Anonymous Versus The Zetas


Setelah berurusan dengan website2 pornografi anak, kelompok peretas Anonymous kembali menyatakan perang terhadap kelompok lain. Kali ini yang ditantang perang adalah kartel obat bius terbesar di Meksiko yang bernama The Zetas. Seperti yang dilaporkan CNN dalam sebuah laporan khususnya.

Zetas adalah kartel obat bius terbesar di Meksiko yang bertanggung jawab atas kematian 40 ribu orang sejak tahun 2006. Pada awal bulan lalu, di dalam rekaman video yang di-upload ke youtube, seseorang yang menggunakan topeng Guy Fawkes dan mengatasnamakan sebagai perwakilan kelompok peretas Anonymous membuat peringatan yang ditujukan kepada Zetas. Pria tersebut mengancam akan mengungkapkan siapa saja orang2 yang berada dibalik keberadaan kartel obat bius itu, termasuk supir taksi, polisi, sampai ke wartawan, jika korban2 penculikan dari Zetas tidak segera dibebaskan.

Anonymous juga membuat pernyataan bahwa "Kami tidak bisa membela diri dengan senjata api, tapi kami punya senjata dengan data yang bisa kami dapatkan, seperti data rumah, mobil dan bar yang dimiliki oleh para anggota jaringan Zetas". Sebagai perang psikologis, Anonymous juga mengatakan bahwa "Mengungkapkan jaringan Zetas itu adalah hal yang sangat mudah, kami tahu siapa saja dan berada di mana saja mereka yang masuk ke dalam jaringan ini".

Jika pernyataan ini adalah asli, maka bisa dipastikan bahwa Anonymous sedang berusaha mengajak perang Zetas. Pada bulan September lalu, seorang user social networking yang bernama Marisol Macias Castaneda, berumur 39 tahun, yang menggunakan nickname Laredo Girl, warga dari kota Nuevo Laredo, ditemukan mati dalam keadaan terpenggal. Di atas tubuhnya ada pesan yang berbunyi "Nuevo Laredo en Vivo and social networking sites, I'm The Laredo Girl, and I'm here because of my reports, and yours." Pembunuhan ini dilakukan kelompok Zetas kemungkinan karena komentar2 dari Marisol mengenai keberadaan Zetas sebagai kartel obat bius.

Pada bulan yang sama, ditemukan pula 2 mayat yang tergantung dan terdapat pesan pada tubuh mereka "Ini yang akan terjadi pada semua orang yang memberikan informasi melalui internet. Perhatikan, kami mengawasi kamu semua".

Kedua orang tersebut diperkirakan adalah anggota dari Anonymous, seperti yang dikatakan oleh orang yang mewakili Anonymous. Dan inilah awal yang memicu para hacker2 yang tergabung dalam kelompok Anonymous untuk menyatakan perang terhadap Zetas.

~ We Anonymous, We Are Legion, We Don't Forgive, We Don't Forget ~

Rabu, 09 November 2011

Addons Firefox Pencegah Pencurian Akun


Tidak salah jika Mitnick pernah mengatakan bahwa manusia merupakan rantai keamanan paling lemah. Contoh kecilnya saja masih banyak akun" facebook yang terkena 'phising' karena keteledoran dari si pemilik akun itu sendiri. 

Pelaku SoCenk paham betul bagaimana cara memanfaatkan salah satu sifat manusia yang disebut 'Rasa Penasaran', tak heran jika mereka memadukan teknik spam fb yang disertai link 'jebakan betmen' via chat fb yang bertujuan menggiring rasa penasaran sang pemilik akun untuk meng-klik dan masuk ke dalam jebakan yang telah disediakan (fake login).

Secara kasat mata, teknik ini terlihat seperti teknik kacangan. Tapi jika Anda tahu berapa ribu akun yang telah terambil alih melalui teknik 'Phising', kira" apa yang ada di benak Anda? 

Mari kita akhiri basa basi ini dan melanjutkan pembahasan pencegahan yang sekiranya bisa dilakukan untuk meminimalisir pencurian akun facebook Anda.

Langkah awal yang sebaiknya Anda lakukan :
1. Memasang antivirus yang memiliki fitur 'Internet Security' (jangan lupa diupdate terus database AV nya)
2. Menghapus aplikasi facebook yang tidak perlu (Privacy setting -> Apps and Website -> Edit your setting)
3. Jangan pernah meng-klik link yang dikirimkan oleh teman sebelum Anda melakukan konfirmasi terlebih dahulu mengenai link yang teman Anda berikan. Jika teman Anda mengaku tidak pernah merasa membagikan suatu link via chat fb, bisa dipastikan bahwa link tersebut merupakan spam fb.
4. Jangan menggunakan password yang sama antara akun email dan akun facebook.
5. Secara rutin ganti password facebook Anda jika diperlukan.

Alternatif lain yang bisa Anda gunakan adalah memasang addons Facebook Phising Protector pada browser Mozilla Firefox.

Langkah-langkah tersebut bisa menjadi panduan awal bagi Anda yang ingin lebih meningkatkan pengamanan akun-akun penting dari kejahatan pencurian akun yang dilakukan oleh orang-orang yang tidak bertanggung jawab. (Saya terlalu malas untuk menyebut para pencuri akun sebagai hacker) :)

Selasa, 08 November 2011

RD Flipping Pages - Joomla Module

Tags
With this module we can create a browsable magazine with few clicks.
The module is based on Flash application developed by IpariGrafika.

The module supports following formats: .JPG, .GIF, .PNG and .SWF.

Documentation :
- Install the module using the Joomla! installer.

- Create a new folder in "modules/mod_RD_flipping_pages/books" and put pages inside it. The images will be loaded in alphabetical order, so you need to name files in the order in which they appear.

- From the management module, enable the module and assign a position in the template.

- Set the option "Update XML" and click "Apply" to save the setting.

- Go to the front end of the site, navigate to the page where the module is published, and then refresh the page. At this point a warning message will appear confirming the updates of the XML file. If the file is not written, you will see an error message, in this case you must change the permissions of the folder "modules/mod_RD_flipping_pages/pageflip/xml" making the folder writable.

- Go back in the management of the module and disable "Update XML".

- Set any other parameters and save.
DEMO | DOWNLOAD

Laughingbird The Logo Creator MEGA Pack v.5.0

Tags

Kesulitan bikin logo via Photoshop? Kenapa ndak coba pake software Laughingbird The Logo Creator? Dijamin dah bikin logo keren" ndak bakal sesulit biasanya. :))

Dengan dukungan tema" yang telah ada dalam versi Mega Pack, akan memudahkan kita mendapakan inspirasi ketika akan membuat sebuah logo yang diperuntukan untuk pribadi maupun perusahaan.

Well.. sebelom lihat download link nya, mari kita lihat fitur" apa saja yang sudah tersedia dalam Laughingbird The Logo Creator Mega Pack versi 5.0 ini : 

480 PROFESSIONALLY CREATED LOGO!
OVER 1,000 LOGO DESIGN ELEMENTS!

Mix, match and manipulate each and every one of the logos!
Design the perfect logo in minutes! Its the ultimate logo maker.
Pick a template, add your own graphics, or modify the hundreds of built in images.
Change the text, font coloring ... and you have a professional logo at very little cost!
Each logo collection contains 50 logo template - and each template can produce thousands of unique logos!
Instruksi dalam melakukan instalasi :

1. Jalankan file .exe nya ,
2. Masukan unlock code (WTMK-5KDZ) ketika diminta
3. Instal file yang di ekstrak
-> Laughingbird Bonus The Logo Creator;
-> Laughingbird Bonus The Logo Creator Cartoon;
-> Laughingbird Bonus The Logo Creator Hollywood; and
-> Laughingbird Bonus The Logo Creator Leisure;
4. DO NOT REGISTER the program or you'll have your Key Banned!

Download Link :  Size: 254 MB
http://www.media*fire..com/?dmekiqejjsu
http://www.media*fire..com/?hq1hwnjdlmi
http://www.media*fire..com/?rp5djiydmby

Masalah Dalam Firefox 4 Sampai 8

Tags

Semenjak Mozilla Firefox meluncurkan versi 4 ke atas (sampai yang terakhir versi 8), banyak kawan" saya yang mengeluhkan ketidaknyamanan saat memakai browser tersebut. Hal itu disebabkan seringnya 'lag' yang terjadi pada browser tersebut. Saya pun mengalami hal yang sama, bahkan saya sampai menguji Firefox versi 4 sampai keluaran terbaru, yakni Firefox 8. Hasilnya.. 'lag' masih sering terjadi :-/

Entah apa yang sebenarnya terjadi pada browser tersebut. Rasanya saya lebih butuh sebuah solusi daripada sekedar tahu penyebab 'lag' yang sering terjadi pada versi-versi terbaru. Alternatif -terakhir- yang akan saya coba adalah melakukan downgrade sampai ke versi 3.6.24  yang katanya stabil.

Well.. mari kita coba apakah versi ini juga ikut ketularan penyakit 'lag' atau tidak :D

Bagi Anda yang mau ikut mencoba downgrade Firefox ke versi 3.6.24, silahkan download di link yang saya sertakan di bawah. Kalo kenyataanya memang masih sering mengalami 'lag', rasanya sudah saatnya mengucapkan selamat tinggal pada browser Mozilla =))

Senin, 07 November 2011

Firaun Dalam Diri Kita


Ingatkah kawan, kisah tentang Firaun yang dahulu pernah mengaku sebagai Tuhan? Kekuasaan menjadikan dirinya merasa mampu menentukan hidup atau matinya seseorang, bisa mengangkat derajat seseorang ke tingkat tertinggi di mata masyarakat atau bahkan sebaliknya, merasa mampu membuat seorang terhormat menjadi ternista jika memang diinginkannya.


Bukahkan dia mengalami akhir hayat yang tragis? Dia bersama balatentaranya digulung lautan saat mengejar nabi Musa a.s beserta rombongannya. Kesombongannya karam ketika melihat kematian hanya berjarak 5 cm dari penglihatannya. Dia yang dahulu pernah mengaku berkuasa atas kehidupan orang lain ternyata tak memiliki kuasa apapun untuk melawan kematiannya sendiri. Bahkan sekedar untuk mengundurnya selama 5 detik.

Allah S.W.T mengabadikan kisahnya dalam Al- Qur'an Surat Yunus ayat 90-92. Melalui kehendak-Nya, jasad Firaun sampai sekarang tetap ada agar menjadi pelajaran bagi kaum setelahnya sampai akhir zaman nanti. Allah yang Maha Menyayangi para makhluk-Nya, memberi petunjuk betapa kita sebagai manusia sering lengah atas tanda-tanda kekuasaan yang Dia berikan.

"Dan Kami memungkinkan Bani Israil melintasi laut, lalu mereka diikuti oleh Fir'aun dan bala tentaranya, karena hendak menganiaya dan menindas (mereka); hingga bila Fir'aun itu telah hampir tenggelam berkatalah dia: "Saya percaya bahwa tidak ada Tuhan melainkan yang dipercayai oleh Bani Israil, dan saya termasuk orang-orang yang berserah diri (kepada Allah)". Apakah sekarang (baru kamu percaya), padahal sesungguhnya kamu telah durhaka sejak dahulu, dan kamu termasuk orang-orang yang berbuat kerusakan. Maka pada hari ini Kami selamatkan badanmu supaya kamu dapat menjadi pelajaran bagi orang-orang yang datang sesudahmu dan sesungguhnya kebanyakan dari manusia lengah dari tanda-tanda kekuasaan Kami.

Ingatkah pula kisah sahabat" nabi Muhammad S.A.W yang pernah meraih kegemilangan pada masanya? Anda tentu tahu siapa orang yang pertama kali mendapatkan kehormatan untuk mengumandangkan Adzan? Apakah Anda mengira beliau berasal dari keturunan orang kaya nan terhormat di kaumnya? Tidak ! 

Tetapi setiap menerima pujian yang ditujukan kepada dirinya, maka laki-laki yang berkulit hitam, kurus kerempeng, tinggi jangkung, berambut lebat dan bercambang tipis — sebagai dilukiskan oleh ahli-ahli riwayat — akan menundukkan kepala dan memejamkan mata, serta dengan air mata mengalir mem­basahi pipinya, akan berkata:  

“Saya ini hanyalah seorang Habsyi, dan kemarin saya seorang budak belian!”

Subhanallah.. elok nian perangai Bilal bin Rabah r.a (Semoga Allah SWT melimpahkan Rahmat dan Karunia-Nya kepada beliau dan sahabat" Rasulullah SAW lainnya)

Kawan, disaat kita merasa 'lebih' daripada orang lain.. disaat itu pula kita tengah lengah. Pandangan kita mungkin sepakat bahwa diri kita lebih baik dalam hal kemampuan, kuasa ataupun materi.  Atau hanya karena sumbangsih yang Anda berikan terhadap sesuatu membuat Anda merasa layak diistimewakan? Merasa lebih jumawa? Saat itu pula Anda tengah memelihara Firaun dalam dada Anda sendiri !

Dalam riwayat Abu Dawud dari Abu Hurairah, Rasulullah صلى الله عليه وسلم bersabda:

«قال الله تعالى : الكبْرِياءُ ردائي ، والعظمة إزاري ، فمن نازعني واحدا منهما قذَفْتُهُ في النار»

“Allah Ta’ala berfirman: “Kesombongan adalah selendangKu, dan keagungan adalah sarungKu, barangsiapa menyertaiKu dengan salah satunya maka Aku lemparkan ia ke dalam Neraka.” 
(Abu Dawud, dishahihlan Albani)

Tentunya Anda tidak berniat 'menyaingi' Tuhan bukan? Bahkan ancaman nyata telah disampaikan bagi mereka, para pemeliharan Firaun di dadanya;

Allah Ta’ala berfirman:

{ إِنَّ الَّذِينَ يَسْتَكْبِرُونَ عَنْ عِبَادَتِي سَيَدْخُلُونَ جَهَنَّمَ دَاخِرِينَ }

“Sesungguhnya orang-orang yang menyombongkan diri dari menyembah-Ku akan masuk neraka Jahannam dalam Keadaan hina dina”. (Ghafir: 60)

{ فَادْخُلُوا أَبْوَابَ جَهَنَّمَ خَالِدِينَ فِيهَا فَلَبِئْسَ مَثْوَى الْمُتَكَبِّرِينَ }
“Maka masukilah pintu-pintu neraka Jahannam, kamu kekal di dalamnya. Maka Amat buruklah tempat orang-orang yang menyombongkan diri itu.” (An Nahl: 29)

Siapapun Anda, Bagaimanapun kemampuan Anda dan sehebat apapun Anda, marilah kita mentafakuri sejenak tulisan ini. :)

Sabtu, 05 November 2011

Computer-based Social Engineering


Computer-based Social Engineering merupakan salah satu teknik Social Engineering yang mengunakan media komputer sebagai sarana kegiatannya. Teknik ini seringkali tidak membutuhkan interaksi langsung dengan target sasaran. Efektif atau tidaknya teknik ini, tergantung kecerdasan pelaku yang mampu memanfaatkan celah keamanan dari manusia yang menjadi targetnya tersebut (Hacking the Human Side) dan tentunya kecerobohan dari sang target itu sendiri. 

Tidak heran, kita sering mendengar jargon utama dari Social Engineering yang berkata, 

"There is No Patch For Human Stupidity".  

Dalam postingan ini, saya akan memaparkan ragam dari Computer-based Social Engineering itu sendiri. Dengan harapan agar kita lebih berhati" terhadap siapapun yang mengunakan Social Engineering untuk kejahatan.


1. Instant Chat Messenger
Populernya media chatting dalam menjalin pertemanan, membuat media ini juga menjadi tempat yang disukai untuk melakukan Social Engineering. Melalui media ini, pelaku bisa berinteraksi dan menjalin pertemanan dengan calon korbannya. Pertemanan yang walaupun dilakukan secara virtual, mempunyai efek yang sama dengan pertemanan pada dunia nyata. Setelah mendapatkan kepercayaan dari calon korbannya, pelaku Social Engineering bisa melakukan serangan secara halus kepada korbannya.

2. Pop-up Windows
Jika Anda sedang melihat-lihat halaman Microsoft.com kemudian tiba-tiba muncul sebuah windows pop-up yang meminta Anda untuk memasukkan alamat email untuk mendapatkan hadiah software Microsoft Office tanpa diundi, apakah Anda akan percaya? Melihat reputasi dari Microsoft, kemungkinan hal ini akan terjadi. 

Banyak pelaku Social Engineering yang memanfaatkan pop-up windows ini untuk mengelabui pengguna. Umumnya, situs-situs tersebut telah di-hack sehingga pop-up windows yang muncul sebenarnya merupakan halaman yang berbeda sama sekali dengan situs yang sedang Anda kunjungi. Cara ini akan sangat efektif pada situs-situs yang memang membutuhkan hak akses sebelum digunakan. 

Bila Anda menggunakan situs bank yang tiba-tiba memunculkan sebuah pop-up windows meminta untuk memasukkan username dan password sebelum bisa melanjutkan, apakah Anda akan melakukannya? Yang mengkhawatirkan adalah bahwa sebagian pengguna akan melakukannya.

3. Surat Berantai (Chain Letter) dan Hoaxes
Surat berantai mungkin sudah sangat tua namun sampai detik ini, metode ini masih saja terus memakan korban. Chain letter atau surat berantai biasanya menawarkan hadiah atau baranggratis asalkan korbannya bersedia mengirimkan email yang sama ke teman-temannya. Tentunya, hadiah yang dijanjikan palsu.

Terkadang, surat berantai juga disertai dengan ancaman bagi yang tidak mem-forward email tersebut seperti kecelakaan yang mengerikan, musibah, bangkrut, bahkan meninggal dunia yang biasanya membawa nama agama. Saya mendapatkan email semacam ini sudah puluhan kali dan tidak pernah melakukannya sekalipun.

4. Email Spam
Email spam adalah email yang dikirimkan kepada penerima tanpa ijin dari penerima dan biasanya bertujuan komersil. Email spam dikirimkan dalam jumlah banyak kepada penerima sekaligus. Pengiriman spam ini mendapatkan daftar alamat email tanpa sepengetahuan dan seijin pemilik email. Biasanya, aktifitas mendapatkan email ini melalui aksi pencurian dengan hacking, dan terkadang melalui pembelian dari black-market. Email-email spam berisi informasi yang sebagianbesar tidak berguna bagi penerimanya. Informasi-informasi ini biasanya seputar bisnis dan penipuan.

Saat ini email spam ada lah masalah dunia karena sebagian besar email yang beredar di dunia ini ternyata adalah email sampah. Murahnya email menjadi salah satu sebab pengiriman email spam begitu merajalela dan sebagian besar spam dikirim dengan membajak komputer yang pengamanannya lemah. Artinya, pengirim spam bahkan tidak mengeluarkan biaya sedikitpun untuk semua bandwith yang dihabiskan untuk mengirimkan email.

5. Phising
Phiising merupakan bentuk penipuan account(username dan password) pengguna pada suatu website. Pelaku penipuan seperti ini biasanya aakan membuat sebuah aplikasi atau tampilan yang menyerupai website yang sebenarnya. Sehingga pengguna yang kurang cermat akan tertipu dengan memasukkan username dan password pada tempat yang tidak semestinya. Website yang menyerupai website yang sebenarnya tersebut akan menyimpan username dan password pengguna, dan dapat masuk ke website aslinya, dan melakukan tindakan kriminal lainnya.


Waspadalah Smiley

Politik SoCenk Dalam Negeri (Part 2)


Rasanya mungkin cuma orang edan semacam saya yang tega mengkaitkan teknik Social Engineering ala hacker dengan teknik Social Engineering ala koruptor di negara kita.

Persamaan paling kentara seperti yang telah saya bahas pada "Politik SoCenk Dalam Negeri Part1" yakni teknik yang dipakai sama-sama menggunakan teknik manipulasi informasi (Deception) dan memahami bahwa manusia merupakan mata rantai keamanan paling lemah (The Weakest Link) dalam sebuah sistem keamanan.

Persamaan kedua,
Kecerdasan Mitnick dalam menggunakan teknik Social Engineering menjadikan cerita dia bagaikan Legenda Rakyat (Urban Legend) di dunia maya. Sementara para koruptor di negeri kita secara sukses menjadikan negara Indonesia menjadi buah bibir negara" lain sebagai negara paling korup sedunia. Hebat bukan buatan ! Miris.. Tragis.. !!

Oh iya.. teknik SoCenk lain yang sering dipakai politikus adalah teknik "Blow Up Case" alias mem-blow-up suatu kasus untuk menyamarkan/ mengalihkan kasus lainnya.. agar media maupun masyarakat teralihkan fokusnya. Teknik ini sekalipun telah tercium kebusukannya oleh media maupun para pakar politik, tapi tak ada satupun yang bisa mencegahnya. Baik media maupun pengamat politik serta rakyat hanya bisa menghujat   selama beberapa waktu setelah itu mereda sendiri setelah bosan. "Badai Pasti Berlalu" - ujar seorang filsuf di bidang koruptor yang juga koruptor mencoba berkata bijak.

.. dan hati para koruptor pun kembali tenang.. setenang air laut di sore hari :))

Mungkin "angin surga" yang dihembuskan setan-setan berdasi kepada rekan' koruptor yth, yang membuat para koruptor senantiasa tidur nyenyak di malam hari sambil bermimpi main golf bersama rekan pejabat lainnya yang juga seorang koruptor.

Sementara rakyat? jangan tanya dah... buat ngusir nyamuk di kamar 2x2 meter aja musti utang obat nyamuk dulu ke warung sebelah :))

Tragis..!! tapi inilah kenyataan kawan :D

Politik SoCenk Dalam Negeri (Part 1)


Dalam artian yang gak paling ribet, Social Engineering merupakan trik/ tipu muslihat yang dilakukan seseorang dalam usahanya memperoleh sesuatu. Yup.. sekarang ini tidak hanya "informasi tertentu" yang menjadi tujuan akhir para pelaku Social Engineering. Seringkali pelaku kejahatan yang menggunakan SoCenk sebagai 'senjata', menjadikan harta-benda sebagai tujuannya. Sementara politikus yang gendut" seringpula menggunakan SoCenk ketika musim kampanye tiba :)) Janji Sana.. janji sini.. mau mensejahtarakan rakyat lah kalo terpilih nanti.. sekolah gratis lah.. dll yang seringkali kata"nya menjadi JAMBU (Janji Busuk) ketika terpilih nanti. :))

Sementara untuk kasus SoCenk tingkat tinggi level politikus disebut konspirasi. 

Contoh lain trik Social Engineering yang sering dilakukan para politikus adalah jurus "ngeles tingkat tinggi" ketika wartawan mencoba mengkonfirmasi berita dugaan kasus korupsi si pejabat gendut. Sementara ini yang sedang populer adalah dengan berpura" tidak tahu/ tidak mengenal seseorang yang mengaku pernah 'Bancakan Duit Rakyat". Ndak usah jauh-jauh deh.. tuh liat aja om Nazarrudin Petot yang pura" lupa. Bisa jadi doi terinspirasi lagunya Kuburan Band yang "Lupa-Lupa Ingat" =))

Bersambung... mo ngojek dolo =))