Award Pertama

Terimakasih pada blog ANEH81 yang telah memberikan award pada blog saya yang sederhana ini. Ini juga award pertama saya.
Saya juga akan memberikan award ini juga kepada :



Smadav 2009 Rev 7.5


In Rev. SmadAV 7 this times has been enhanced to be much faster and lighter in detecting and securing your computer from virus threats in Indonesia. New features added such as Smad-Turbo (Scanning 10x faster), Smad-Theme (Changing the color theme), Smad-Ray (Auto flash is very fast scan). This all makes SmadAV become one of the fastest antivirus and lightest in the world, so SmadAV still be used on computers with lower specifications though.

In Rev. 7 It also adds a database SmadAV introduction of new viruses that spread across much of Indonesia. The development of local virus currently diminishing as active and not the preceding months. Maybe it's because SmadAV already widely used computer users in Indonesia. Thus, local virus in Indonesia now live a little longer to get to extinction.

In addition, too many improvements made to the view that the overall SmadAV SmadAV easier and practical to use. The following is a description of the new features in SmadAV 2009 Rev 7:

Smad-Turbo (Scanning 10x faster)
Smad-Turbo is one of the fastest antivirus scanning feature in the world that belongs only SmadAV Pro. If the Free SmadAV takes you 20 minutes to scan the entire contents of computer files, using this feature you only need to take approximately 1-2 minutes to scan the entire contents of the file on your computer. So, Scanning SmadAV Pro 10x faster than SmadAV Free to use these Smad-Turbo.

Smad-Theme (Changing color themes)
SmadAV Pro has ability to replace colors theme SmadAV who initially green become colors your choice. On the theme color settings you can find your own color choices for the theme SmadAV. After you change the theme color, the color of all SmadAV display will automatically turn into the color of your choice.
Smad-Ray (Auto flash is very fast scan)
After the flash plug-in computer disks, SmadAV will immediately bring the scan results in the form of notification if your flash is infected with a virus or not, the process is very fast only about 1-5 seconds so you do not need a long wait for the results of scanning the new flash plug.
Repair SmadAV view
Display SmadAV long been considered a user who is still too large and not suitable for some users in Mini Laptop / Netbook. In Rev. This time the display 7 SmadAV been smaller and SmadAV can adjust the size to be used in mini Netbook.

Comparison SmadAV Free & Pro
At the donation tab now has added the comparison table SmadAV Free & Pro. You can click on the lines of this table to see the advantages compared SmadAV SmadAV Pro Free.

Completion SmadAV Rev. 2009. 7.1
  • Addition of new virus database
  • AutoUpdate for SmadAV Pro on Vista & Win7
  • Bug fix Scan with SmadAV
  • Loading Quarantine faster
  • Send statistics to the server SmadAV
  • Bug in clearing the virus fusion
Completion SmadAV Rev. 2009. 7.2
  • Added features in Exception 1-Virus Tools By-User
  • Added many new virus database
  • Improved connection with the server program Smadav.net SmadAV
  • Improved protection registration key anti-piracy
Completion SmadAV Rev. 2009. 7.3
  • Clean thoroughly for several new viruses
  • Adding intelligence (heuristic) virus detection SmadAV
  • Improved update method SmadAV
  • Replacement of the primary server Smadav.net
  • Improvement of detection in some programs
Completion SmadAV Rev. 2009. 7.4
  • Smad-Behavior (Beta), a new feature for the protection SmaRTP computer program based on behavior
  • Clean thoroughly for 55 new local virus
  • Completion of cleaning the virus more quickly SmadAV
  • Added button "More" at the scanner
  • Changing the folder name "Smad-Lock" to "Smad-Lock (Safe SmadAV)"
  • Shipping Smadav.net statistics to the server, to prevent piracy SmadAV Pro
  • Additions to explore the function of quarantine
  • Improved bug in the file selection dialog when the virus by 1 user
Completion SmadAV Rev. 2009. 7.5
  • Adding a local database 103 new viruses
  • Completion of Smad-Behavior to avoid False Positive
  • Adding some new heuristic techniques
  • Improvements SmadAV bug that causes hangs when scanning a particular file
  • Improvement of protection and blacklists to use pirated Pro SmadAV
  • Improved automatic refresh bug on tree-directory display

Download Smadav 2009 Rev. 7.5

Sources From: SMADAV.NET

Cracking Zip Password Files

Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.

FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.

FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.

Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this.

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.

If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------

The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50


--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

Change Text on XP Start Button


Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from http://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.

Cannot Use Password to Get Back into Windows XP


Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.

If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon
for the user account with administrator rights, or click on the icon
for the administrators account.
Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.
8.Then close all Windows, reboot the system and try to log in.


There are also applications that can recover the password for you.
The following companies provide these applications at a cost.
iOpus® Password Recovery XP here.
LostPassword.com, here.
Asterisk Password Recovery XP v1.89 here.
Windows XP / 2000 / NT Key here.


If the above information does not help in recovering the password, the only option left is to
format the hard drive then reinstall Windows and the system software.

Mimo Mini USB Monitor

At first we considered making sarcastic comments about paying the same for a miniature 7" monitor that you would for a monitor three times the size. Then we took a closer look at the Mimo Mini USB monitor and realized it is powered entirely via USB, no external AC adaptor or video card needed. This miniature display marvel also runs in landscape or portrait mode and also comes in a touchscreen version. Mimo Mini, we think we love you - full specs after the jump.

  • Small monitor runs completely off of USB, giving you an extra mini display whenever and wherever you need it.
  • No extra power needed. The Mimo monitor is powered by USB.
  • No extra video card. The Mimo has a built in video card that runs over any USB 2.0 connection.
  • Rotating Portrait or Landscape view. Go vertical for notes and spreadsheets, horizontal to watch a movie.
  • Great for laptop use. The Mimo stores easily in your bag and is
  • ready to go simply by plugging it in
  • 740 Model offers touchscreen abilities for control with a finger or stylus
  • Mac and Windows driver support (intel Mac only). Additional drivers required for touchscreen use of the 740 monitor on Mac OS.
  • Display size - 7"
  • Display resolution - 800 x 480
  • Brightness - 350 cd/m2
  • Contrast ratio - 400:1
  • Connections - USB 2.0
Sources From : gadgetmadness

CrunchPad tablet project self-destructs

News site TechCrunch on Monday said that its CrunchPad tablet project has 'self destructed' due to a legal dispute. The touchscreen slate was to have been unveiled soon but is effectively being shut down as the actual developer, Fusion Garage, has claimed it will sell the device without further input from the co-developer and would only carry the CrunchPad name, using site founder Michael Arrington only as a product evangelist.

Arrington has rejected the option and pointed out that the decision, supposedly made under pressure from Fusion Garage's shareholders, amounts to intellectual property theft. TechCrunch had been jointly developing the product and still owns both part of the technology rights as well as the CrunchPad name. The site is filing lawsuits to prevent the sale without its involvement and refuses to accept any counter-offers, comparing it to a contractor betraying its client at the last minute.

"This is the equivalent of Foxconn, [which builds] the iPhone, notifiying Apple a couple of days before launch that they’d be moving ahead and selling the iPhone directly without any involvement from Apple," Arrington wrote.

The project was intended to prove that a web-only, touchscreen device could be made for $300 and was receiving help from multiple sources to reach that price target, including a "major multi-billion dollar retail partner" that would have sold it at cost, steep discounts from Intel for Atom processors, and ad sponsors that would subsidize the cost of the device. It would have carried a 12-inch capacitive touchscreen, run Linux and had just 4GB of storage onboard, instead depending entirely on sites like Hulu, YouTube and others for media and similar features; it could also have theoretically run Google's Chromium OS or even Windows 7.

Many had expected the CrunchPad to stand as an alternative to closed-source and likely more expensive alternatives expected next year that could include, among others, Apple's rumored tablet or a production version of the Microsoft Courier.

Bell launches MiFi 2372 hotspot with HSPA 3G

As promised, Canadian wireless and cable provider Bell on Monday has began offering the Novatel Wireless MiFi 2372 Intelligent Mobile Hotspot. The device uses Bell's recently launched HSPA network and will let up to five users share a single 3G connection over Wi-Fi.

The announcement makes Bell the first to carry the MiFi 2372 in Canada. The device is compatible with Windows, Mac and Linux operating systems and will allow for 7.2Mbps transfer speeds, which is fast enough for streaming video and some forms of online gaming. The MiFi also has a microSDHC memory card slot, letting it double as a thumb drive.

The Novatel router is available for $100 CAD ($94) on a three-year data contract or for $250 CAD ($235) without a contract.

Sources from: electronista
Related Posts Plugin for WordPress, Blogger...